Some of the ideas under development feel akin to science fiction – like Swarm Biotactics' cyborg cockroaches that are equipped with specialised miniature backpacks that enable real-time data collection via cameras for example...
Thursday, July 24, 2025
Roach Coach for Spy Tech
Some of the ideas under development feel akin to science fiction – like Swarm Biotactics' cyborg cockroaches that are equipped with specialised miniature backpacks that enable real-time data collection via cameras for example...
FutureWatch: Spy-Grade Storage Drive
Saturday, July 19, 2025
Apple sues YouTuber who had planted 'spy'...
The lawsuit claims Ramacciotti broke into his friend Ethan Lipnik's Apple-issued development phone while staying at his home, then showed the unreleased software to Prosser via FaceTime.
According to Apple's complaint, Ramacciotti used location tracking to monitor when Lipnik would be away from his Santa Clara apartment, obtained his passcode, and accessed his development iPhone. The device contained unreleased iOS 19 software and "significant amounts of additional Apple trade secret information that has not yet been publicly disclosed."
Apple terminated Lipnik's employment for failing to secure the development device and is seeking injunctive relief and damages. more
Data Leak Exposes IDs of UK Spies
FutureWatch: Reachy Mini, tiny new open-source robot leading the DIY robot revolution
Reachy Mini is an 11-inch tall, open-source robot that you can program in Python right out of the box. Think of it as the friendly cousin of those intimidating industrial robots, but one that actually wants to hang out on your desk and maybe help with your coding projects. video
Secret Recordings are on the Rise
Divorcees spying on exes, perverted landlords and staff wanting to know their next pay rise are among those making secret recordings using bugs hidden in everyday items, an expert has warned.One bug sweeping specialist told MailOnline that recording devices contained in plug sockets used for USB mobile phone chargers were particularly popular with snoopers because 'no one is going to suspect them'. more
Spycam News: Ba Dmup "Here we come..."
The woman, who police are calling "Ms Golf", had sex with at least nine monks, police said at a press conference on Tuesday. They believe she received around 385 million baht ($11.9m; £8.8m) over the past three years.
Investigators who searched her house found more than 80,000 photos and videos used to blackmail the monks, the police spokesman said...
Norway on Lookout For Russian Spies In an Arctic Town
The Journal’s video shows us accompanying Norway’s domestic intelligence agency, the PST, on patrol for Russian spies. We meet residents convinced they are under Russian surveillance, and we find out firsthand what it feels like to be trailed.
European intelligence officials say Kirkenes is a laboratory for Russia’s hybrid warfare—a potential ground zero for the kinds of espionage and sabotage attacks that have ramped up across Europe in recent years. more
Unauthorized LEGO copies of ASML’s chip machines sold in China despite export bans
The LEGO versions of ASML’s High-NA EUV machines, which cost about 208 euros and were intended solely as novelty items for ASML employees, have appeared on Taobao, a popular marketplace operated by Alibaba Group...
While the Chinese government has allegedly not been able to obtain the real EUV machines—subject to strict export controls imposed by the U.S. and Dutch governments—buyers can reportedly easily purchase the toy version. more "Leaked" new cell Chinese phone photo.
Tuesday, July 15, 2025
Dual Purpose AI - Personal Secretary / Eavesdropping Spy
New Voice Recorders are getting smarter, thinner, more feature-packed and more easily hidden.
This particular device can record for 30 hours and AI summarizes the interesting things it hears in about 30 seconds. P.S. It can also record cell phone calls.
Wednesday, July 9, 2025
AI Voice Clones are the Hot New Spy Tool
- A U.S. governor.
- A member of Congress.
- And THREE foreign ministers.
Here's what keeps security experts up at night: Voice cloning now costs as little as $1-5 per month and requires only 3 seconds of audio. Testing shows 80% of AI tools successfully clone political voices despite supposed safeguards.
...important question is this: do you have a catch phrase and/or signal to use with your loved ones to confirm it’s them? If you don’t, you should. The question isn't whether AI voice cloning will be used against you—it's when, and whether you'll be ready. more
Monday, July 7, 2025
Travel Security - Hotel Safes & Spybuster Tips
Check for default codes:
• The hotel is responsible for ensuring the safe is secure and the master code is reset to prevent unauthorized access.
• If the master code is not reset, anyone with knowledge of the default code can potentially access the safe.
• Some hotels may charge a fee to reset the safe code to a custom PIN number.
• Portable Travel Safes - Soft or hard lockboxes with steel cable tethers. You hide them elsewhere in the room (e.g., attached to plumbing or heavy furniture). They avoid the hotel supplied safe altogether.
• Tamper-Evident Devices - Security tape, zip ties, or door seals placed over the safe seam or keypad can alert you to tampering. They don’t secure, only monitor.
• Bluetooth Tracker - Hide a Tile, AirTag, or Chipolo inside the safe. It may notify if the safe is opened, and its location if it has been moved.
• Security Cables - Wrap a steel cable lock (not a heavy duty bike or motorcycle cable) through the safe door handle or around the body—but this depends on the safe’s design. These may also be useful for turning your suitcase or backpack into an impromptu security enclosure.
Q. Why make this information publicly available and teach the bad guys?
Thursday, July 3, 2025
Why Every Company Needs a Travel Security Program
From global enterprises with sprawling footprints to lean small and midsize firms entering new markets, the reality is clear: If your people cross borders, your business is crossing into risk...
• Traveler support channels: Offer 24/7 access to assistance for emergencies, device issues, or detainment.
• Documentation and transparency: Publish clear travel policies and make them inclusive. more
AI Would Rather Let People Die Than Shut Down
![]() |
| N.B. Singularity caused the Krell's extinction. (1956) |
Recent Spy News
A Pennsylvania state court has dismissed the bulk of two lawsuits accusing the Rivers Casino in Pittsburgh of illegally wiretapping a guest to assist her friend's ex-husband in a child custody case, but allowed the plaintiff to proceed with some invasion of privacy claims. more
Privacy Screens Ruin the Fun of Snooping - Lately, the screen protectors have become a common sight in densely populated public areas. They have become particularly popular among people with sensitive professions, like doctors and therapists, who must be cautious about their patients’ personal information when working outside their offices... “You can put that privacy screen over your laptop or your phone and feel a sense of accomplishment,” he said. “Even though in the big picture that may be the least of your worries, it still is somehow psychologically satisfying to do something to protect the value that you hold of the importance of privacy rather than doing nothing at all.” more - phones, computers, laptops
A Torrance man has been charged with felony possession of child pornography and other crimes after he allegedly planted hidden cameras inside a bathroom and changing room at a children’s dance studio in Hermosa Beach, where he worked as a front desk receptionist... a parent discovered a hidden camera in the studio’s changing room. Police subsequently found video cameras hidden in the studio’s bathroom and changing room. more (Learn how to spot spy cams.)
Four-steps to test if your phone is Eavesdropping on You:
1. Pick a Topic: Choose a topic you’ve never searched for or spoken about near your phone.
2. Speak Aloud: Talk about it near your phone for a few days, using relevant keywords.
3. Act Normally: Continue using your phone as usual—don’t search for the chosen topic online.
4. Watch the Ads: Analyze the ads that appear on your devices. If you notice related ads, your phone may be listening. more
Two Chinese nationals arrested for spying on US Navy personnel and bases
Man arrested for 'spying' for Iran before possible attacks in Germany
Danish national arrested after allegedly spying on Jewish targets for Iran
Israeli couple accused of spying for Iran as authorities uncover multiple espionage plots
Canadian teen jailed in Poland as Russia spy may be freed early, court says
Surge in Afghans driven from Iran in spy hunt after Israel attacks
Iranian authorities make sweeping arrests in wake of war with Israel
Russia Uncovers Ukrainian Spy Ring In Crimea, Arrests 2 For High Treason
Greek citizen detained on espionage charges in occupied Cyprus
Taiwan jails 10 people for spying for China
Mexican drug cartel hacker spied on FBI official's phone to track and kill informants
Mass Federal Layoffs Open New Espionage Opportunities for China
Russia Recruits Ukrainian Teens for Espionage and Sabotage via Telegram
US and Russian spy agencies agree to keep hotline open, Kremlin espionage chief says
Four Cool Spy Cameras for Sale
Yours,
Peter Coeln
Steineck
Condition: B+
Year: c.1949
Suzuki Optical Co.
Camera-Lite B Gold
Condition: B
Year: 1955
$2,878.21
Lancaster
Watch Camera Men's Model
Condition: B
Year: 1890
$26,383.61
School Employee Arrested - Allegedly Using Hidden Recorder
(Michael) Brown is listed on the DeKalb County Schools website as a computer technician. more
Android 16 Feature Could Stop Hackers from Spying on Your Phone
But — and here’s the catch — most current Android phones won’t support this. It needs new hardware. The first phone expected to come with this built-in protection is likely the upcoming Pixel 10, which should launch later this year. more
Sony, JBL and Bose Headphones: Could Let Hackers Spy on You
Security researchers (ERNW) have uncovered three vulnerabilities in a Bluetooth chipset present in dozens of devices from multiple manufacturers... three flaws in the Airoha system on a chip (SoC), apparently “widely used” in True Wireless Stereo (TWS) earbuds.
The SoC is allegedly present in 29 devices from different manufacturers, including a couple of high-profile names: Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel. Speakers, earbuds, headphones, and wireless microphones all seem to be affected. more
‘The Last Spy’ (movie review)
When the CIA discourages spymaster Peter Sichel from writing his memoirs and returns a heavily redacted manuscript, the sharp as ever 102-year-old decides it’s time to tell his own story—unredacted.
What he reveals is an extraordinary life lived at the crossroads of Western history and the shadowy world of intelligence. more
Thursday, June 19, 2025
CISOs Anticipate Surge in Cyber Attacks Next Three Years
The report, “CISO Outlook 2025: Navigating Evolving Domain-Based Threats in an Era of AI and Tightening Regulation,” names cybersquatting, domain and DNS hijacking, and distributed denial-of-service (DDoS) attacks as the top three global cyber threats in 2024. These risks are only projected to escalate, as cybercriminals leverage new techniques and capabilities from AI and other modern technologies to launch more sophisticated attacks. Looking ahead, cybersquatting, domain-based attacks, and ransomware top the list of cybersecurity concerns for CISOs over the next three years. more
Flash: Councillors Put Phones in Kitchen Amid Bugging Claims
The protocol has been introduced at Attleborough Town Council following suspicions that one of the councillors has been secretly recording discussions and leaking details...
The new protocol about phones being left in the kitchen next to the council chamber relates to ‘under the line’ parts of the meetings, where the public can be excluded and confidential matters discussed...
Heineken and Shell Linked to Massive Espionage Scandal in Italy
On paper, Equalize provides services like business intelligence and reputation management. It conducts research into the reliability of suppliers, the position of competitors, or misconduct by customers’ staff. Under the counter, Equalize also sold confidential data gained from hacking into police systems, the Italian tax authorities’ systems, and the reporting center for suspicious bank transactions, according to the Italian authorities. The company also had informants within Italian government organizations. more
Protecting Electronic Devices When Crossing U.S. Borders
- Consider leaving your device behind.
- Password-protect your electronic devices with strong passwords
- Back up data before traveling.
- Remove sensitive data from a device before traveling.
- Remember that “deleted” files can be searched.
- Log out of cloud accounts
- Know your rights and legal status.
- Keep emergency contact information (including for an attorney) on paper to make this information available if a device is seized.
- If your device is seized, request a receipt (CBP Form 6051D)
- After a search, be sure to change your passwords.
Summer Reading: Philby’s Granddaughter Exposes Espionage’s Best-Kept Secret: Women
Philby’s new book, The Secret Lives of Women Spies, uncovers the hidden stories of female operatives, from Civil War spy Harriet Tubman to Resistance hero Josephine Baker and Soviet spymaster Agent Sonya.
Journalist and author Charlotte Philby writes in The Independent, the representation of women in espionage remains long overdue.
Philby—granddaughter of infamous double agent Kim Philby—offers a personal and poignant look into this evolution. Recounting her travels to Moscow and reflections on her grandfather’s complicated legacy, she notes the glaring absence of women in spy narratives. “Where were all the women?” she asks, recalling the male-centric portrayals of Cold War espionage in books, plays, and films.
Publication date : 19 Jun. 2025
Language : English
Print length : 240 pages
ISBN-10 : 0241709431
ISBN-13 : 978-0241709436
Britain’s MI6 Spy Agency - First Female Chief
Superyachts Are Getting Caught Up in Spy Scandals
Even the rich and powerful may not be safe from the world of international espionage, as recent reports have alleged that countries are using multimillion-dollar superyachts in spy operations. And at least one country, China, has reportedly been spying on the superyacht manufacturers themselves.
How are superyachts connected with spying?
Most notable is Russia, which is reportedly "using its unrivaled underwater warfare capabilities to map, hack and potentially sabotage critical British infrastructure," said The Sunday Times...
This is noteworthy given that many of these oligarchs' yachts have moon pools, which are openings in the bottom of a ship's hull that can be "used covertly to deploy and retrieve deep-sea reconnaissance and diving equipment," said the Times...
Beyond the yachts themselves, Chinese officials may be spying on superyacht manufacturers, in particular luxury shipbuilder Ferretti SpA, according to a Bloomberg report. more
Weird Spy Science: Watch Watches Computer
The concept, created by researchers from Ben-Gurion University, sounds like something out of a spy thriller, but the details reveal just how technically complex and narrowly feasible such an attack would be.
These ultrasonic transmissions operate between 18 and 22 kHz, just above the range of human hearing, and can carry data such as keystrokes or biometric information at up to 50 bits per second over distances of at least six meters.
For any part of the attack to work, multiple difficult steps must already be accomplished. (Whew!) more
Wednesday, June 11, 2025
Bugging Devices Found at Italian Yacht Builder Ferretti
...the Ferretti Group filed its own complaint... “Ferretti SpA considers itself an aggrieved party, having been wronged by the unlawful and improper installation of surveillance devices within its offices,” the statement said. more
Laptop Microphone Could Be Spying — Through Walls — Even When It’s Off
• The attack is surprisingly accessible: Researchers achieved over 94% accuracy in speech recognition using simple equipment like copper tape antennas, making this vulnerability exploitable by anyone with basic technical knowledge.
• Your “off” microphone might still be listening: Testing revealed that microphones often activate automatically when playing audio or video content, and some remain active even when apps appear muted. more
Spy Device Can Read Book Text from Nearly a Mile Away
As detailed in a new paper published in the journal Physical Review Letters, the team used interferometry, a commonly used technique in the world of astronomy that uses superimposed waves of light to create interference patterns, to develop the spy system.... Put simply, researchers applied a technology that space observatories use to a ground-based laser system to zoom across vast distances — with promising and somewhat creepy results. more
OpenAI's New Threat Report is Full of Spies, Scammers, and Spammers
Ever wonder what spies and scammers are doing with ChatGPT?
OpenAI just dropped a wild new threat report detailing how threat actors from China, Russia, North Korea, and Iran are using its models for everything from cyberattacks to elaborate schemes, and it reads like a new season of Mr. Robot.
The big takeaway: AI is making bad actors more efficient, but it's also making them sloppier. By using ChatGPT, they’re leaving a massive evidence trail that gives OpenAI an unprecedented look inside their playbooks.
1. North Korean-linked actors faked remote job applications. They automated the creation of credible-looking résumés for IT jobs and even used ChatGPT to research how to bypass security in live video interviews using tools like peer-to-peer VPNs and live-feed injectors.
2. A Chinese operation ran influence campaigns and wrote its own performance reviews. Dubbed “Sneer Review,” this group generated fake comments on TikTok and X to create the illusion of organic debate. The wildest part? They also used ChatGPT to draft their own internal performance reviews, detailing timelines and account maintenance tasks for the operation.
3. A Russian-speaking hacker built malware with a chatbot. In an operation called “ScopeCreep,” an actor used ChatGPT as a coding assistant to iteratively build and debug Windows malware, which was then hidden inside a popular gaming tool.
4. Another Chinese group fueled U.S. political division. “Uncle Spam” generated polarizing content supporting both sides of divisive topics like tariffs. They also used AI image generators to create logos for fake personas, like a “Veterans for Justice” group critical of the current US administration.
5. A Filipino PR firm spammed social media for politicians. “Operation High Five” used AI to generate thousands of pro-government comments on Facebook and TikTok, even creating the nickname “Princess Fiona” to mock a political opponent.
Why this matters: It’s a glimpse into the future of cyber threats and information warfare. AI lowers the barrier to entry, allowing less-skilled actors to create more sophisticated malware and propaganda. A lone wolf can now operate with the efficiency of a small team. This type of information will also likely be used to discredit or outright ban local open-source AI if we’re not careful to defend them (for their positive uses).
Now get this: The very tool these actors use to scale their operations is also their biggest vulnerability. This report shows that monitoring how models are used is one of the most powerful tools we have to fight back. Every prompt, every code snippet they ask for help with, and every error they try to debug is a breadcrumb. They're essentially telling on themselves, giving researchers a real-time feed of their tactics. For now, the spies using AI are also being spied on by AI.
Any Wall Can be Turned Into a Camera...
An ordinary camera could soon take photos of things that are out of sight, thanks to algorithms that interpret how light bounces off a wall.
“Normally, when light bounces off rough surfaces, like walls, it scrambles the scene into a messy blur,” says Wenwen Li at the University of Science and Technology of China, Hefei. “Our goal was to ‘unscramble’ that blur and recover the hidden scene. Think of it like turning a rough wall into a mirror.”
The method involves mapping the geometry and reflectance of the wall surface by taking many images under different lighting conditions, so the researchers could predict how each bump and groove would distort reflected light. Once they had created a digital model of the surface, the team devised equations to reconstruct a hidden image from the scrambled light pattern
Li and her colleagues have successfully demonstrated real-time imaging at 25 frames per second using an ordinary camera, like one found in a smartphone. more
Personnel Officer, "So, What Qualifies You for this National Security Position?"
His professional experience prior to joining a U.S. national security agency was remarkably similar to that of Thomas Fugate, who has just been appointed to lead terror prevention at the Department of Homeland Security.
A cybersecurity graduate of Florida Polytechnic University, Nathan Vilas Laatsch is the second national security official in two days whom The Daily Beast has revealed to have virtually no professional experience other than working at a grocery store before being hired by a U.S national security agency at the age of 22.
Laatsch, now 28, a computer scientist with “top secret” clearance at the Defense Intelligence Agency (DIA) in Virginia, was hired under the last Trump administration. He was arrested last week, accused of attempting to pass sensitive information to Germany’s Federal Intelligence Service (BND). more
FBI: Home Internet Connected Devices Facilitate Criminal Activity
The Federal Bureau of Investigation (FBI) is issuing this Public Service Announcement to warn the public about cyber criminals exploiting Internet of Things (IoT) devices connected to home networks to conduct criminal activity using the BADBOX 2.0 botnet. Cyber criminals gain unauthorized access to home networks through compromised IoT devices, such as TV streaming devices, digital projectors, aftermarket vehicle infotainment systems, digital picture frames and other products. Most of the infected devices were manufactured in China. Cyber criminals gain unauthorized access to home networks by either configuring the product with malicious software prior to the users purchase or infecting the device as it downloads required applications that contain backdoors, usually during the set-up process. Once these compromised IoT devices are connected to home networks, the infected devices are susceptible to becoming part of the BADBOX 2.0 botnet and residential proxy services known to be used for malicious activity.
WHAT IS BADBOX 2.0 BOTNET
BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android operating system devices that were compromised with backdoor malware prior to purchase. BADBOX 2.0, in addition to compromising devices prior to purchase, can also infect devices by requiring the download of malicious apps from unofficial marketplaces. The BADBOX 2.0 botnet consists of millions of infected devices and maintains numerous backdoors to proxy services that cyber criminal actors exploit by either selling or providing free access to compromised home networks to be used for various criminal activity.
INDICATORS
The public is urged to evaluate IoT devices in their home for any indications of compromise and consider disconnecting suspicious devices from their networks. more
Friday, June 6, 2025
Behold The Amazing "AIR" Key
Corporate Spy v Spy v Spy v Spy, or Spy Cubed
The complaint accuses Deel of targeting, infiltrating, and compromising four other competitors, in addition to Rippling.
The revised complaint doesn’t name all of the four other alleged victims, except cryptocurrency-based tax and payroll compliance company, Toku. Toku is suing its competitor LiquiFi, also alleging corporate espionage and that Deel was involved...
So, A Man Steals A Cherry-Picker...
A man carjacked an L.A. County Sheriff’s Department bucket truck early Wednesday morning while a sheriff’s deputy was precariously positioned high above the ground in the bucket, authorities said....
Two undercover deputies were using the truck to remove concealed cameras when a man jumped into the vehicle, said he had to go to the hospital and began to drive away, law enforcement sources told The Times.

























