Sunday, November 29, 2020

Work From Home (WFH) Risks Assessed


The work-from-home (WFH) arrangement appeared to be the safest way for employees and businesses to continue operating during the pandemic, but it also exposes companies to heightened cyber security risks, studies showed...


There is also a perception that getting home security controls or measures or support from their companies is getting expensive...

The study showed that 43 percent of breach victims were small businesses, and 34 percent of data breached involved internal actors. The same survey showed that 15 percent of companies found millions of files open to every employee. ...The study showed that 71 percent of breaches were financially motivated and 25 percent is due to espionage. more

Concerned about Sony's PS5 spying on you? Here is What You Can Do...

Sony's always-on PS5 DualSense mics are sparking privacy concerns. The PlayStation 5's DualSense controller comes with a built-in mic that's on by default, and it records what you say to help Sony "analyze" key data points. Here's how to change those settings, and what they mean.

Gamers are a bit concerned about privacy on the PS5. 

It was recently confirmed the DualSense's mic auto-records anything you say when unlocking an in-game trophy. This is just the tip of the iceberg, really.

As a PS5 owner you can limit the data that Sony collects. But you can't turn data collection off entirely.

Here's how to adjust your data collection settings:
Settings -> Users and Accounts -> Privacy -> Data You Provide more

Friday, November 27, 2020

GPS Trackers, Hidden Cameras on the Rise During Pandemic

Domestic violence offenders are increasingly using GPS trackers and surveillance cameras to monitor their victims, with support workers saying technology-based abuse has escalated during the pandemic... 

The report, co-authored by researchers from WESNET, Curtin University and the University of New England, surveyed 442 support workers from around the country who specialise in helping victims of family and sexual violence...

In 2020, nearly one in three frontline workers said they saw victims tracked with GPS apps or devices "all the time". Five years ago, only 8 per cent of workers saw that type of abuse that often.

Surveillance camera misuse was seen "all the time" or "often" by 42 per cent of support workers in 2020, up from 16 per cent in 2015. more

Learn how to detect covert cameras.

Thursday, November 26, 2020

Spy News of the Week

NZ - A soldier based in New Zealand has been charged with spying, the NZ Defense Force confirmed in a statement Wednesday. Why it matters: The soldier allegedly has ties to far-right extremist groups, per multiple local media reports. They're the first person to face espionage charges in New Zealand. more

Iran released a British-Australian scholar, Kylie Moore-Gilbert, detained since 2018 on charges of spying for Israel, in a prisoner swap conducted Wednesday for three Iranian men described by Iran’s official media as businessmen who had been held abroad. more

TX - A Texas A&M employee claims in a federal lawsuit against the university that her former boss secretly recorded her and dozens of other women using the bathroom... The camera was located underneath a counter in the women’s bathroom, facing toward the toilet. more

Swedish Foreign Minister Ann Linde formally urged Iran to cancel an execution for an Iranian-Swedish professor charged with spying for Israel. more 

Prime Minister Benjamin Netanyahu has promised Jonathan Pollard, an American who spent 30 years in U.S. prison for spying for Israel, a warm welcome and a comfortable life in Israel now that parole restrictions have ended. more

Hackers have the ability to use Light Detection and Ranging (LiDAR) technology to enable vacuum cleaners to eavesdrop private conversations in houses. A LiDAR sensor is designed to scan the surroundings by utilising laser-based ranging techniques to create a distance map. In robotic vaccum cleaners, these sensors act as navigators and provide mapping services to clean houses. more

MA - Betty Cavacco is calling for a special town counsel to investigate alleged email spying by Town Manager Melissa Arrighi, but no one else on the Select Board is supporting that proposal. Following a lengthy executive session that delayed the start of Tuesday’s meeting, board member Cavacco read a statement urging the appointment of an investigator to review this matter, calling the allegations of spying on emails “a disturbing and scary affront to the foundations of the government of this town.” more

Swiss public television, SRF, has found a second company besides Crypto AG was involved in manufacturing manipulated devices allegedly used for spying by foreign intelligence... Of concern are the OC-500 series devices. Devices were sold to several Swiss federal agencies. However, Swiss authorities only noticed the devices weren't secure in the mid-2000s. more

100 Best Spy Movies of all Time

Stacker compiled data on all spy movies to come up with a Stacker score—a weighted index split evenly between IMDb and Metacritic scores. Here are the best spy movies of all time... more

#5 - Duck Soup


 

Nicolas Sarkozy Eavesdropping Trial Will Resume Monday

France - Nicolas Sarkozy’s trial for corruption in the “wiretapping” affair will be held well by the end of the year. After a false start last Monday, the court requested the resumption of the hearing next Monday, November 30.

The corruption trial of former President Nicolas Sarkozy in the “eavesdropping” affair will resume next Monday, November 30, the Paris Criminal Court having rejected on Thursday November 26 the request for referral, for health reasons, of one of his co-defendants. more

Wednesday, November 25, 2020

The Case of the "Donated" Apples, or Pad My Palm

Apple Inc.’s head of global security and the Santa Clara County undersheriff are among those charged in an alleged bribery scheme in which iPads worth $70,000 were to be given to the Santa Clara County Sheriff’s Office in exchange for concealed-carry firearms permits, according to an indictment released Monday...“Undersheriff Sung and Captain Jensen treated CCW licenses as commodities and found willing buyers,” Santa Clara County Dist. Atty. Jeff Rosen said in a statement. “Bribe seekers should be reported to the district attorney’s office, not rewarded with compliance.”

Monday, November 16, 2020

EaaS - Espionage as a Service

Ransomware-as-a-service has become so popular and profitable that bad actors in the dark markets are expanding their range of illicit services to offer dedicated phishing and espionage campaigns too.

Over the past half a year, BlackBerry’s Research and Intelligence team has been keeping a close eye on a cyber-espionage campaign that is targeting individuals around the world. Dubbed ‘CostaRicto’ by BlackBerry, the campaign seems to be run by 'hackers-for-hire', a group of skilled APT actors with bespoke malware tooling and complex VPN proxy and secure shell (SSH) tunneling capabilities...

When it comes to espionage campaigns, outsourcing the whole or even part of the campaign is a compelling proposition, particularly for businesses and individuals who are looking for inside information on their competitors but don’t necessarily have the skills, tools or experience to do this themselves. (and/or want plausible deniability) more

The use of cutouts is a popular and very effective spy tactic. Most corporate espionage (and competitive intelligence) is based on this method. 

Pretext'ers, employment moles, buggers, blackmailers, aerial reconnaissance pilots, private investigators, and bribers are just a few of the EaaS types. Now, hackers join the list. The one thing they have
in common is stay invisible and don't get caught. 

Thus, the victim never realizes they have been victimized. 

Thus, only corporations with smart security directors conduct Technical Surveillance Countermeasures (TSCM) inspections, information security surveys and provide employees with counterespionage training.

In Other News... Laser Device Can Make Lightning Strike Specific Targets

An international team of researchers says that small lasers could be used to guide lightning strikes — much like Thor’s legendary hammer Mjölnir.

“It turns out that to deliver particles, you do not need high-intensity lasers, even low intensity like your laser pointer will be already enough,” Andrey Miroshnichenko, a researcher at the University of New South Wales in Canberra, Australia, told Agence France Presse of the work...

“We can imagine a future where this technology may induce electrical discharge from passing lightning, helping to guide it to safe targets and reduce the risk of catastrophic fires,” co-researcher Vladlen Shvedov from the Australian National University told AFP.

Or you could use it to smite your enemies. Just saying. more

Jilted IT Expert Bugged Wife’s TV and Car

A jilted IT expert bugged his ex’s TV and car after their 20-year marriage ended... He sneaked into his estranged partner’s home while she was away and planted a listening device in the TV and hid an iPhone in her car.

Ms Ewart told a court: “He sent text messages to me about TV shows I had been watching.” 

Ewart, of Washington, admitted stalking and was jailed for 18 weeks, suspended. He must wear an electronic tag to keep him away from his ex. more  & more

Bridge Workers Claim Spycams Installed in Locker Room

Maintenance workers at the Kingston-Rhinecliff Bridge are claiming that management installed spy cameras in their locker room. New York State Bridge Authority Executive Director Tara Sullivan has denied the accusations but acknowledged the use of the cameras...

The room where the cameras were discovered was used as a locker room for half of the work crew as well as an office for the assistant foreman, Mr. Gravino...

Executive Director Sullivan called the report “incorrect.” She said, “There is no investigation by the State Police and there have been no cameras placed at the Kingston-Rhinecliff Bridge facility where there would be a reasonable expectation of privacy such as a locker room or changing room.” more

Friday, November 6, 2020

Why Law Firms and Businesses Need TSCM - Reason #243

UK - A former Dechert client told a London judge Tuesday that spying conducted on a BigLaw partner is a common tactic in hard-fought commercial litigation.

A lawyer for the former client, a Kazakh mining company called the Eurasian Natural Resources Corp., is asking the judge to toss claims that spying on Dechert partner Neil Gerrard and his wife constituted illegal harassment, Law360 reports.

The ENRC hired Diligence International to surveil Gerrard in the hopes of gathering information for a lawsuit against Dechert and the United Kingdom’s Serious Fraud Office. Toward that end, Diligence planted hidden cameras in a hedge outside Gerrard’s home, Gerrard has alleged.

Lawyer Tom de la Mare said the cameras weren’t supposed to be found, so their placement couldn’t constitute harassment, according to Law360. And surveillance isn’t illegal unless oppressive or unreasonable, he said.

“Let’s be blunt about it,” de la Mare said. “This type of surveillance used to be common in commercial litigation.” more

Commercial TSCM Inspections
Spy Camera Detection Training

Can Two-Party Consent to Record be Obtained Using a False Persona?

Massachusetts' top appellate court said it will review a case over whether a recorded telephone interview between a Barstool Sports podcast host and a local city mayor runs afoul of a law prohibiting secret recordings if one party fraudulently obtains consent for taping...

Having been denied an interview with Curtatone about the mayor's comments on the issue, Minihane tried again, this time claiming to be Boston Globe columnist Kevin Cullen, according to the suit. Minihane, posing as Cullen, was granted the interview, in which he told the mayor he was recording...

Barstool and Minihane's attorney Aaron Moss of Greenberg Glusker LLP said in a statement Thursday that he is confident the SJC will reject Curtatone's arguments and uphold the lower court's ruling. 

"The Massachusetts Wiretap Act is crystal clear that it only prohibits secret recordings. If a recording isn't secret, the question of consent is irrelevant," Moss said. more

Interesting question. How would you decided?

Security Director Alert – Hackers Exploiting VoIP to Compromise Business Accounts

A hacking campaign has compromised VoIP (Voice over Internet Protocol) phone systems at over 1,000 companies around the world over the past year in a campaign designed to make profit from selling compromised accounts.

While the main purpose appears to be dialing premium rate numbers owned by attackers or selling phone numbers and call plans that others can use for free, access to VoIP systems could provide cyber criminals with the ability to conduct other attacks, including listening to private calls, cryptomining, or even using compromised systems as a stepping stone towards much more intrusive campaigns...

It's recommended that organizations change default usernames and passwords on devices so they can't easily be exploited and, if possible, analyze call billings on a regular basis for potentially suspicious destinations, volumes of traffic or call patterns.

And most importantly, organizations should apply the required security patches to prevent known vulnerabilities from being exploited. more

Snitch Culture Redux, or The Hong Kong So Long

Police in Hong Kong have launched a hotline where residents can report breaches of the national security law imposed by Beijing earlier this year.

The law criminalizes secession, subversion and collusion with foreign forces. It has silenced many protesters since it came into force.

Hong Kong residents can send images, audio and video files to the hotline.

Rights groups say they are concerned the service could be used to target those with opposing political views. more

 It is worth remembering that "Citizen Snitch Surveillance" is a tactic of cultures that eventually fail. 

About one in 100 East Germans was an informer for communist East Germany's secret police in 1989, according to a new study. Political ideology was their main motivation, both in East and West Germany.

Stasi files

The Stasi kept detailed files on thousands of East Germans

Around 189,000 people were informers the secret police of the GDR's communist regime, when the Berlin Wall fell in 1989 -- that's according to Thuringia's state office for researching East Germany's Stasi... more
 
See the movie...

Your Weekend Movie – “A Call to Spy” Now Streaming

A Call to Spy” is now available to watch via streaming services and in select theaters across the United States and United Kingdom...

Premiering on June 21st, 2019 -- the 75th anniversary of D-Day -- at the Edinburgh International Film Festival, the film has gone on to win numerous awards...

In the beginning of WWII, with Britain becoming desperate, Churchill orders his new spy agency—the Special Operations Executive (SOE)—to recruit and train women as spies. 

Their daunting mission: conduct sabotage and build a resistance. SOE's "spymistress," Vera Atkins (Stana Katic), recruits two unusual candidates: Virginia Hall (Sarah Megan Thomas), an ambitious American with a wooden leg, and Noor Inayat Khan (Radhika Apte), an Indian Muslim pacifist. Together, these women help to undermine the Nazi regime in France, leaving an unmistakable legacy in their wake. Inspired by true stories. more

Sunday, November 1, 2020

New York’s KGB Espionage Museum Will Soon Go Up for Auction

It’s a sad fact that as the coronavirus crisis stretches on, many museums and galleries won’t be able to survive the economic crunch, and will likely be forced to sell off their collections. 

However, this also means that vast and unusual troves of items will be redistributed to the public, which is the case with an upcoming Julien’s Auctions sale of the entirety of the items within the KGB Espionage Museum in New York City. 

Set to take place on February 13, 2021 at Julien’s Auctions in Beverly Hills and online simultaneously, the auction will include the world’s largest collection of authentic KGB spy equipment dating back to the Cold War...

“The KGB Espionage Museum’s collection of Cold War era items is one of the largest and most comprehensive in the world,” Martin Nolan, the Executive Director of Julien’s Auctions, told Observer on Thursday. “We anticipate the auction will attract a wide range of collectors from museum curators to historians to James Bond fans, particularly in this election year." more

Missing Wirecard Executive Could be Austrian Spy

German authorities say a missing Wirecard manager, who vanished just as the digital payments company collapsed, may be an informer for Austria’s intelligence agency.

Austrian-born Jan Marsalek, Wirecard’s former chief operating officer, disappeared without trace in June just as it emerged the company had inflated its balance sheet by at least €3 billion.

While the worldwide hunt continues for the fugitive 40 year-old executive, German prosecutors have told Bundestag MPs there is evidence that Mr Marsalek, who was in charge of all Wirecard operational business, was a source for Austria’s BVT intelligence agency. more

The Modern Detective: How Corporate Intelligence Is Reshaping the World

Tyler Maroney has written The Modern Detective, in which he reflects on a two-decade career as a PI, detailing his pursuit of corporate fraudsters, missions to conduct due diligence for blockbuster mergers and acquisitions, and even how he helped free an innocent man from prison...

"Private detectives are brought into projects throughout the entire life cycle of a company’s existence."
Maroney seeks to demystify the job of private investigators and debunk myths ingrained from television and pulp fiction. He argues that the modern detective is a vital cog in corporate life and can be a force for good in society. more

Sir Sean Connery Has Died at the Age of 90

The Scottish actor was best known for his portrayal of James Bond, being the first to bring the role to the big screen and appearing in seven of the spy thrillers.

Sir Sean died peacefully in his sleep in the Bahamas, having been "unwell for some time", his son said. more

In Other Spy News...

Whistle-blower Edward Snowden will become a father by the end of the year and his child is eligible to be a citizen of Russia, where the U.S. citizen has been living since in 2013 after releasing details of the U.S. electronic-surveillance program. more

Friday, October 30, 2020

Florida Woman Arrested for Hacking Home Camera System

A woman from Naples, Florida has been arrested after allegedly hacking into the home camera system of a family member as part of an extortion attempt.

Agents with the Florida Department of Law Enforcement arrested Jennifer Lenell Small on October 26 and charged the 44-year-old with a third-degree felony cybercrime.

Agents say that Small accessed the home camera system of a male family member as part of an extortion attempt that involved a contested will. Her alleged victim was a former employee of her husband's construction company.

"Small gained access to the camera and stored recordings after her husband’s construction company fired the victim and he turned the cell phone back into the company," said a spokesperson for the Florida Department of Law Enforcement.

The company cell phone that the victim had returned to his employer had an app installed on it that allowed the victim to view footage from his home security camera system...

A FDLE spokesperson said: "Small sent a short video clip to the victim telling him she had hours of videos that she would use against him in court if the victim did not agree to mediation." more

Spybusters Tip #934: Wipe your devices before passing them on.

New York Times — Fighting the ‘Bugging Epidemic’

With surveillance gear cheaper and easier to use, security experts say checking your environment for cameras and microphones is not a crazy idea.

People worry that Big Brother and Big Tech are invading their privacy. But a more immediate concern may be the guy next door or a shifty co-worker. 


 A growing array of so-called smart surveillance products have made it easy to secretly live-stream or record what other people are saying or doing.
Consumer spending on surveillance cameras in the United States will reach $4 billion in 2023, up from $2.1 billion in 2018, according to the technology market research firm Strategy Analytics. Unit sales of consumer surveillance devices are expected to more than double from last year.

The problem is all that gear is not necessarily being used to fight burglars or keep an eye on the dog while she’s home alone. Tiny cameras have been found in places where they shouldn’t be, like Airbnb rentals, public bathrooms and gym locker rooms. So often, in fact, that security experts warn that we are in the throes of a “bugging epidemic.”

It is not paranoid to take precautions. A lot of spy gear is detectable if you know what to look for, said Charles Patterson, president of Exec Security, a firm in Tarrytown, N.Y... more

STEVE WOZNIAK & STEVE JOBS — Blue Box up for Auction

Blue Box, 1972. An original first iteration "blue box" populated circuit board made by Steve Wozniak and marketed by Steve Jobs and Wozniak, 51 x 72 mm, with speaker wire and 9volt battery connector.

Provenance: Purchased directly from Steve Wozniak by the consignor in Autumn 1972 during a drive together from Sunnyvale to Los Angeles.

Bid estimate:
US$ 4,000 - 6,000
£ 3,100 - 4,600

While "phone phreakers" (hobbyists who were fascinated by the phone system) had used a "blue box" since the 1950s to avail themselves of free phone service, the first digital blue box was designed by Steve Wozniak in 1972. 

It was marketed and sold by Wozniak (who took the phone phreak name "Berkeley Blue"), Jobs (known as "Oaf Tobar"), and friends in Berkeley and throughout California in 1972 and 1973. 

Wozniak cites the number of boxes they produced at 40 or 50, while Jobs put the number at 100; but certainly many of those were confiscated as phone phreaking arrests increased throughout 1973 to 1975, in part due to the commercial distribution of the devices. 

These blue boxes represent the first commercial collaboration between the two Apple computer giants, and the circuit boards the first printed boards by Woz. 

Very few of the Wozniak originals have survived and even fewer of these first iteration boards as Wozniak soon changed the circuit board layout to accommodate a less expensive membrane keypad. The early models would have been made by Wozniak himself. more

Back Story: I examined the photos closely. The IC chips have manufacturing dates of 1973 & 1974, thus the provenance appeared misleading. I advised the specialist at Bonhams. To his credit, and that of the auction house, they very quickly researched it further. The auction now has an addendum which clears up the mystery...

"PCB was purchased unpopulated directly from Steve Wozniak by consignor and parts were later added by consignor. Wozniak confirmed in an email to the consignor that this was one of his boards and that Steve Jobs had it printed."
 

Scarier than Halloween - Ponder This Over the Weekend...

In an influential 2003 paper, University of Oxford philosopher Nick Bostrom laid out the possibility that our reality is a computer simulation dreamed up by a highly advanced civilization. In the paper, he argued that at least one of three propositions must be true:
  1. Civilizations usually go extinct before developing the capability of creating reality simulations.
  2. Advanced civilizations usually have no interest in creating reality simulations.
  3. We’re almost certainly living inside a computer simulation.

Now, Columbia University astronomer David Kipping took a hard look at these propositions, also known as Bostrom’s “trilemma,” and argued that there’s essentially a 50-50 chance that we are indeed living in a simulation, Scientific American reports.

Thursday, October 29, 2020

Microsoft Says Iranian Hackers Targeted Conference Attendees

Microsoft says Iranian hackers have posed as conference organizers in Germany and Saudi Arabia in an attempt to break into the email accounts of “high-profile” people with spoofed invitations. 

The targets included more than 100 prominent people invited by the hackers to the Munich Security Conference, which is attended by world leaders each February, and the upcoming Think 20 Summit, which begins later this week in Saudi Arabia but is online-only this year.

“We believe Phosphorus is engaging in these attacks for intelligence collection purposes,” said Tom Burt, Microsoft’s security chief, in a prepared statement. “The attacks were successful in compromising several victims, including former ambassadors and other senior policy experts who help shape global agendas and foreign policies in their respective countries.” more

Wednesday, October 28, 2020

Surveillance Startup Used Own Cameras to Harass Coworkers

A surveillance startup in Silicon Valley is being accused of sexism and discrimination after a sales director used the company’s facial recognition system to harass female workers. 

Verkada, which was valued in January at $1.6 billion, equips its office with its own security cameras. 

Employees at Verkada accessed the company's facial recognition system to take photos of women colleagues and make sexually explicit jokes.

Last year, the sales director accessed these cameras to take photos of female workers, then posted them in a Slack channel called #RawVerkadawgz alongside sexually explicit jokes. The incident was first reported by IPVM and independently verified by Vice. more

Phones, Cameras, Cardkeys - What Will Track You Next?

Thanks to a new system developed at EPFL, building owners can detect the number of occupants and track their movement using sensors installed on floor slabs. This novel approach could be particularly useful for enhancing safety in retirement homes or managing buildings' energy use more efficiently...

Scientists at ENAC's Applied Computing and Mechanics Laboratory (IMAC), headed by Professor Ian Smith, have developed an alternative approach.  

"By installing sensors in a building's floor slabs, we can measure the vibrations created by footsteps. That lets us calculate the number of people in the building as well as where they are located and their trajectory," says Slah Drira, the IMAC Ph.D. student who completed his thesis on this topic.

To each his own gait...

"The signals our sensors record can vary considerably depending on the person's anatomy, walking speed, shoe type, health and mood," says Drira.

His method uses advanced algorithms—or more specifically, support vector machines—to classify the signals recorded by the sensors. Some interpretation strategies were inspired by the convolutional neural networks often employed in pixel-based image recognition, and can identify the footstep characteristics of specific occupants. more

Have Some Free Time? Learn How to Detect Spy Cameras

On-line, self-paced, professional video training course to detect spy cameras in “expectation of privacy” areas for organizations and private individuals. more

Spycam detection training

Brit Accused of Spying on 772 People via Webcam...

... tells court he'd end his life if extradited to US.

'I've seen programmes on American prisons' says wife

A Briton is reportedly fighting extradition to the United States after deploying webcam malware onto hundreds of women's laptops so he could spy on them undressing and having sex.

Christopher Taylor, a 57-year-old labourer, appeared by video link at Westminster Magistrates' Court to contest an extradition attempt by the US government, according to the Court News UK newswire.

Taylor told District Judge Michael Fanning that both he and his wife would kill themselves if he was forcibly removed to the US...

A US grand jury in the state of Georgia indicted Taylor, of Vicarage Road, Wigan, with computer fraud and wire fraud charges in January last year, the court was told. The Briton is accused of spying on 772 victims from 39 different countries after tricking them into installing CCTV camera management software called Cammy. more

Friday, October 23, 2020

Corporate Security: Patent and Trade Secret Enforcement in China

via Zhong Lun Law Firm
Over the past decade, patent and trade secret litigation has become increasingly popular in China. 

This chapter focuses on China’s adjudication system in patent and trade secret cases, on the various ways to collect evidence and the procedures involved. It also looks at recent trends to help foreign companies understand China’s patent and trade secret litigation system and to safeguard their legal rights and interests in China...

Electronic intrusion, violation of confidentiality obligations and other criminal acts are also recognized as misappropriation of trade secrets. In addition, commercial espionage crimes have also been added, which are defined as “stealing, spying, buying, and illegally providing trade secrets for foreign institutions, organizations and personnel”. more

The "electronic intrusion" part is important. Not conducting regular Technical Surveillance Countermeasures (TSCM) inspections risks weakening your standing, and missing crucial supporting evidence.



Orianne Cevey vs. Phil Collins - Accusations of Hidden Cameras

There’s been many twists and turns in the ongoing legal battle between Phil Collins and his on-again, off-again ex-wife Orianne Cevey. 

...the Swiss jewelry designer is alleging she’s being spied on by the Grammy winner after discovering a large number of hidden cameras in the hotly contested home.

In an affidavit obtained exclusively by the Daily Mail, Cevey claims she “discovered approximately 20 hidden cameras throughout the Family Home, including in my personal bathroom and changing room. These cameras were installed without my knowledge or consent. I covered these cameras with Band-Aids in order to preserve my privacy and the privacy of my children in the Family Home." more

When it comes to electronic surveillance, Band-Aid solutions are often applied. Corporations and high profile individuals either ignore the threat, or hire the most inexpensive, least knowledgeable, and least effective individuals to protect their information and privacy. Here is a list of questions to ask before you hire anyone to debug your home or business.

"Bond?, James Bond?!?! ...You're Putting Me on."

Recently declassified Cold War-era documents about a suspected British agent named James Bond have the Polish public and some in the intelligence community shaken, not stirred.

On Feb. 18, 1964, the agent named Bond, James Bond, arrived in Warsaw, then behind the Soviet Union's Iron Curtain, a barrier separating the Communist Eastern Bloc from the West.

Officially, he was employed as an archivist for the British Embassy Military Attache. But he soon earned the attention of Polish counter-intelligence officers. At one point, he was spotted snooping around a military base along the Soviet border, the Wall Street Journal reported. more

Friday Funnies

High Bridge, NJ - Tin Foil Hat Contest
Worried about microwave mind zapping, spies, aliens, or your nosy neighbor?  You may find a answer to your concerns here... Polka Dot Café in High Bridge, NJ more

Trump’s Twitter Account Was Hacked
President Trump’s Twitter account was hacked last week, after a Dutch researcher correctly guessed the president’s password: “maga2020!more

Ghostbusters sneakers from Reebok
Reebok is releasing this fun and cartoony Ghostbusters "Ghost Smashers" sneaker design on Halloween. more (You really need the matching backpack to complete the outfit.)

Wednesday, October 21, 2020

Spycam Detection Training - Now with English, Spanish & Korean Closed Captions

On-line, entertaining, self-paced, video training with Certificate of Completion...

Click to enlarge.
SPYCAM DETECTION TRAINING
teaches the basic investigative skills necessary to identify and detect covert spy cameras. 
 
It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. 
 
By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.

In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.

Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.

SPYCAM DETECTION TRAINING is primarily useful for:

  • security managers,
  • facilities managers,
  • store managers,
  • security officers,
  • private investigators,
  • landlords,
  • real estate management companies,
  • targets of activist groups,
  • and businesses which invite the public into their locations.

Recognizing and detecting spy cameras is also a valuable skill for:

  • law enforcement personnel,
  • security management students,
  • and the general public wishing to protect themselves against video voyeurism.

The course is structured to give the student:

  • a full understanding of the video voyeur problem,
  • a written policy which provides deterrence, leverage, and shows due diligence in court,
  • an understanding of the different types of spy cameras and how to identify them,
  • instruction on how to plan and execute a proper inspection,
  • and instruction on what to do if a camera is found and how to handle the evidence.

The course takes about an hour to complete.

Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.

Although SPYCAM DETECTION TRAINING focuses heavily on protecting workplace environments, there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases. 

Preview SPYCAM DETECTION TRAINING for FREE.

Tuesday, October 20, 2020

Kevin's Security Scrapbook Tops 100,000 Visitors from the USA Alone!

 Thank you, everyone! ~Kevin




The Most Underrated Threat to Corporate Information Security

Sharp spike in internet sales of USB spy cables has corporate security and IT directors concerned. Murray Associates researched and developed a solution. 

• Malicious USB cables look exactly like the real thing.
• Some act as eavesdropping bugs.
• Some have GPS tracking capability.
• The worst ones… more  pdf

Cautionary Tale: What's Worse Than Being Caught on an Open Microphone?

Being caught on an open camera...

"I believed I was not visible on Zoom," he told Vice. "I thought no-one on the Zoom call could see me. I thought I had muted the Zoom video."

Jeffrey Toobin, 60, also a prominent CNN commentator, has been in demand as the US election campaign intensifies.

The incident, first reported by Vice News, happened during an election simulation involving the New Yorker and WNYC radio last week.

Mr Toobin, in a statement to Vice, said: "I made an embarrassingly stupid mistake, believing I was off-camera." more

Spybuster Tip #840:
• Always assume the mic and camera are live, and act appropriately.

Spybuster Tip #841:
• Know how to use your tech.

Estimated Lifespan of Your Passwords

Click to enlarge.

Spread the Word - Not the Germs


Friday, October 16, 2020

Consumer Reports - All the tools You Need for Online Safety

Keep Your Data Secure With a Personalized Plan

Cut down on data collection and prevent hackers from invading your laptop, tablet and even your phone. Answer a few simple questions to get customized recommendations to help you:
  • Safely backup files
  • Browse online without tracking
  • Avoid phishing scams
  • Prevent identity theft

CR Security Planner is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.

Consumer Reports is an independent, nonprofit member organization that works with consumers to create more fairness, safety, and transparency in the marketplace. We don’t run third-party ads, and no company will ever exercise influence over our recommendations of products or services.

Even North Korea has Industrial Espionage Problems

North Korean man investigated for industrial espionage...
A North Korean man in his 40s is reportedly under investigation by the Ministry of State Security for turning over internal analyses from his workplace to a Chinese trader, Daily NK has learned.

The internal analyses the man gave to the trader reportedly concerned technology used to develop North Korean-style cosmetics. There is speculation that he will be sent to a political prison camp for espionage. more

Covid 19 Affects MI5's Spies Street Surveillance Tactics

The pandemic has changed the way millions of people work -- and even spies aren't exempt.

Near-empty streets caused by fewer people traveling into city centers can make it difficult for Britain's spies to track suspects, the new head of MI5, the UK's domestic security service, has said.

Ken McCallum told journalists Wednesday that his agents have adjusted the way they work as a result of the coronavirus crisis, after crowds thinned in public spaces. more

Facebook "Bug" Bugged iPhone Camera - Bugged Instagram'er Sues

Facebook has got itself in trouble again as the California-based tech giant has been allegedly sued for spying on Instagram users using the camera on the phone, Bloomberg reported.

According to the lawsuit, which has come following reports from July, the photo-sharing application had been accessing the camera on the iPhone to spy on users even when they weren’t activated.

Facebook has denied the claim and blamed a bug saying that it’s correcting the problem. more

Woman Allegedly Hacked Ex’s Alexa to Scare off New Girlfriend

Double Feature!
An IoT Cautionary Tale...
A Crazy Ex Tale...

A jilted London woman allegedly hacked into her ex-boyfriend’s Amazon Alexa device and used it to scare off his new girlfriend, a report said.

Philippa Copleston-Warren, 45, was accused in a London court of using the virtual assistant to flash the lights inside her former boyfriend’s house on and off and tell his new sweetie to scram after he ended their relationship of two years, The Sun reported.

The defendant spoke through the Alexa account to tell the complainant’s friend in the property to leave and to take her stuff,” prosecutor Misba Majid told Westminster Magistrates’ Court, according to the newspaper.

This so distressed the girlfriend, it caused her to cry and she left.

Copleston-Warren (inset), a management consultant, controlled the device from London, about 130 miles from her businessman ex-beau’s house in Lincolnshire, the paper reported.

She is also accused of hacking her ex’s Facebook account and uploading nude pictures of him. more

Spybuster Tip # 721: Learn how to adjust ALL the features of your digital assistant. This could have been prevented.

In Other News... Japan to Release Radioactive Water Into Sea

Japan is to release treated radioactive water from the destroyed Fukushima nuclear plant into the sea, media reports say.

It follows years of debate over how to dispose of the liquid, which includes water used to cool the power station hit by a massive tsunami in 2011.

Environmental and fishing groups oppose the idea but many scientists say the risk it would pose is low. more

What could possibly go wrong?

Enjoy the weekend, with a good flick.

Monday, October 12, 2020

New Malware Toolset Used for Industrial Espionage

Malware authors are using an advanced toolset for industrial espionage, warned researchers at cybersecurity firm Kaspersky.

...the tool uses “a variety of techniques to evade detection, including hosting its communications with the control server on public cloud services and hiding the main malicious module using steganography.”

...files are disguised to trick employers into downloading them. They contain names related to employees’ contact lists, technical documentation, and medical analysis results to trick employees as part of a common spear-phishing technique...

MontysThree is designed to specifically target Microsoft and Adobe Acrobat documents, Kaspersky said. The malware can enable attackers to capture screenshots and gather information about the victim’s network settings, hostname, etc. more

Espionage Alert: Children's Smartwatch is a Trojan Horse

A popular smartwatch designed exclusively for children contains an undocumented backdoor that makes it possible for someone to remotely capture camera snapshots, wiretap voice calls, and track locations in real time, a researcher said.

The X4 smartwatch is marketed by Xplora, a Norway-based seller of children’s watches...

The backdoor is activated by sending an encrypted text message. Harrison Sand, a researcher at Norwegian security company Mnemonic, said that commands exist for surreptitiously reporting the watch’s real-time location, taking a snapshot and sending it to an Xplora server, and making a phone call that transmits all sounds within earshot. 

Sand also found that 19 of the apps that come pre-installed on the watch are developed by Qihoo 360, a security company and app maker located in China. more  (q.v. our 2017 post  & etc.)

Sunday, October 11, 2020

Bugged Turtle Eggs – Good Surveillance Tech

The Wire Inspired a Fake Turtle Egg That Spies on Poachers 

Scientists 3D-printed sea turtle eggs and stuffed transmitters inside. When poachers pulled them out of nests, the devices tracked their every move.


In the HBO series The Wire, Baltimore cops Herc and Carver devise an unorthodox way to listen in on a drug dealer named Frog, right on the street: They shove a tiny, $1,250 microphone into a tennis ball, which they then place in a gutter. 

Listening in from a building across the street, they watch as Frog picks up the ball and absentmindedly tosses it between his hands, sending thuds and an electric screech into Herc’s headphones. Quickly over it, Frog chucks the ball over their building. Carver rushes after it, only to watch a semi truck crush their very expensive tennis ball.

The Baltimore PD’s failure, though, may still be biologists’ gain. Drawing both from the imaginary surveillance tennis ball and a story arc from Breaking Bad, in which the Drug Enforcement Agency uses GPS to track methylamine barrels, real life researchers have developed the InvestEGGator: a fake sea turtle egg filled with a transmitter in place of an embryo, a clever new way to track where poachers are selling the real deal. more

Friday, October 9, 2020

The FBI Hotel Wi-Fi Security Checklist


The Federal Bureau of Investigation is issuing this announcement to encourage Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework.
FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. 

US hotels, predominantly in major cities, have begun to advertise daytime room reservations for guests seeking a quiet, distraction-free work environment. While this option may be appealing, accessing sensitive information from hotel Wi-Fi poses an increased security risk over home Wi-Fi networks. 

Malicious actors can exploit inconsistent or lax hotel Wi-Fi security and guests’ security complacency to compromise the work and personal data of hotel guests. Following good cyber security practices can minimize some of the risks associated with using hotel Wi-Fi for telework. more