As we move closer to higher levels of autonomous driving, the occupants of a car will need something to pass the time. That's why several new vehicles are equipped with teleconferencing facilities. It may sound silly, but don't forget we now live in a world where a Mercedes-Benz E-Class comes standard with TikTok and a selfie camera. more
Saturday, November 18, 2023
Ford's Anti-Eavesdropping Tech Is Straight Out Of A Spy Movie
As we move closer to higher levels of autonomous driving, the occupants of a car will need something to pass the time. That's why several new vehicles are equipped with teleconferencing facilities. It may sound silly, but don't forget we now live in a world where a Mercedes-Benz E-Class comes standard with TikTok and a selfie camera. more
Employee Exposed Himself to Espionage by Seeking Sex Parlours
The case is just one of more than 500 allegations the CBSA deemed "founded" last year and released as part of an access to information request.
According to the redacted file, the employee — who is not named in the document — allegedly engaged in illegal activities "by purchasing sexual services from massage parlours in Japan, China and Canada." more
Update: Court Grants Exec Bail in Industrial Espionage Case
In a case that underscores the country's efforts to crack down on industrial espionage, prosecutors have alleged that the former executive Choi Jinseog, a South Korean chip expert, stole information formulated by the world's top memory chipmaker to help his client set up a chip factory in China. more
BlackBerry - The Best Movie Of 2023?
Those who lived through the era of BlackBerry phones being the must-have product on the market will look back at the moment in history with a newfound sense of awe after seeing the film, while those too young to recall the ubiquity of the full-keyboard phone will be shocked and appalled by the underhanded business practices which brought mobile internet to the next level. more
ChatGPT Is Apparently a Great Surveillance Tool
Social Links, which was previously kicked off Meta’s platforms for alleged surveillance of users, showed off its unconventional use of ChatGPT at a security conference in Paris this week. The company was able to weaponize the chatbot’s ability for text summarization and analysis to troll through large chunks of data, digesting it quickly.
Obviously, privacy advocates have found this more than a little disturbing... more
How an Indian Startup Hacked the World
Chuck Randall was on the verge of unveiling an ambitious real estate deal he hoped would give his small Native American tribe a bigger cut of a potentially lucrative casino project.
A well-timed leak derailed it all.
Smart Toys Spying on Children
In its Trouble in Toyland" report released Thursday, the organization explained that smart toys "can incorporate various technologies, like cameras, microphones and sensors, as well as artificial intelligence capabilities and connectivity through the internet or Bluetooth." It specifically flagged some risks that it said parents and their children could see arise. more
How We Got This Way - The effect of kids being influenced by their spy toys.
Wednesday, November 15, 2023
Why You Really Need a Technical Information Security Consultant
by R. Mark Halligan
For years, there has been a debate whether “confidential” information is analogous to a “trade secret.” It is not. Information is either protected as a “trade secret” or not protected as a “trade secret.” Any other characterization of “confidential” information undermines the protection of trade secret assets and interferes with lawful and fair business competition.
There is no such thing as non-trade secret “confidential” information.
There is no such thing as “confidential” information that does not rise to the level of a trade secret.
There is no middle ground: Either the information is a “trade secret” (and protectable) or not a trade secret (and not protectable).
A “trade secret” is an intellectual property asset that requires reasonable measures to protect the information as a “trade secret” and proof that such information derives an actual or potential economic advantage from the secrecy of the information. more
Sunday, November 12, 2023
Professor Accused of Wiretapping Other Professors
According to the affidavit, the devices were being held in place by a substance. The ULM professor was in his office when one of the devices fell on the floor. The second device was found after the graduate assistant searched the door area of the office.
ULM Police then stationed themselves and conducted surveillance, identifying the suspect as Chad Allen Lewing, who is also a professor at the university. On November 8, 2023, at 5:30 AM, Lewing was detained by authorities while allegedly attempting to remove the devices.
Police learned that Lewing arrived at work two hours early and he was the only person in the building, besides two ULM police officers. Lewing was transported to the university’s police station and refused to talk with authorities...
Officers went on to find two more devices in the office spaces of two other ULM professors. more
AirTags: The New Go-to Tool for Cops
Court: Automakers Can Record & Intercept Owner Text Messages
The Seattle-based appellate judge ruled that the practice does not meet the threshold for an illegal privacy violation under state law, handing a big win to automakers Honda, Toyota, Volkswagen and General Motors, which are defendants in five related class action suits focused on the issue. One of those cases, against Ford, had been dismissed on appeal previously. more
NJ Jury Finds Attorney Illegally Recorded Ex-Son-In-Law
NSA Unveils "Artificial Intelligence Security Center"
“The AI Security Center will become NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices guidelines, principles, evaluation methodology, and risk frameworks for AI security, with an end goal of promoting the secure development, integration, and adoption of AI capabilities within our national security systems and our defense industrial base,” Nakasone said...
The news about the center comes as the NSA also plans to establish a new “innovation pipeline” focused on China. more
Friday, November 3, 2023
Weekend Read: “Spymaster’s Prism: The Fight Against Russian Aggression”
When the book was first published in the middle of the pandemic in 2021, there was only an emergent acknowledgement of the real threat posed by Russian "active measures" and espionage to Western interests. Though I devoted an entire section to Ukraine called "New Berlin", I could not have foretold how much the world would change only a year later, on 24 February 2022...
Wednesday, November 1, 2023
The CIA Teaches You How to Speak Like a Spy
Example: Rolled-up - when an undercover operation goes bad and is raided by opposing forces, resulting in agents or assets being arrested.
Shady Things You Can Do With a Flipper Zero
You can use a Flipper Zero to control your TV, cheat your Nintendo, replace your work ID, open your hotel room door, and more. I’m sure you could see where the “evil” part could comes in. But on the other hand, it’s just a tool, and its ability to commit crimes is... more
Wednesday, October 18, 2023
Utah Lawyer Charged with Voyeurism...
There were also recordings of women employed by Judd using the bathroom. When the recordings were recovered, employees examined the vent in the video but found the camera had been removed, according to documents...
The same employee said that one duty she performed at work was to order items for Judd on an Amazon account they both had access to. “The account history showed that several small spy cameras had been ordered beginning February 2021, and continuing through that year,” documents state. more
Is This a Bug?
This question comes from Reddit, where someone answered correctly.
We have a collection of many other "Is This a Bug?" photos and explanations.World Spy News Roundup
CA - The Five Eyes countries' intelligence chiefs came together on Tuesday to accuse China of intellectual property theft and using artificial intelligence for hacking and spying against the nations, in a rare joint statement by the allies. more
USA - Ethical hacker helps prevent a potential espionage disaster for CIA. A glitch on X, formerly known as Twitter, could have opened a can of worms for the Central Intelligence Agency (CIA) had an ethical hacker on the microblogging website not sprung to action. more
Survey - 53% of employees in the Middle East, Turkiye, and Africa region fear spying from drones... Corporate spies and hackers use drones to get trade secrets, confidential information, and other sensitive data from corporations and data centers. A drone can carry a device for hacking into corporate networks – for instance, a smartphone, a compact computer (e.g., Raspberry Pi), or a signal interceptor (e.g., Wi-Fi Pineapple [1]), and hackers use these devices to access corporate data and disrupt communications. All wireless communication (Wi-Fi, Bluetooth, RFID, etc.) is vulnerable to drone attacks. more
Finland - Dead man's estate and firm fined €5m in shipyard espionage case. A man who worked for the Meyer Turku shipyard copied files from the shipyard and a shipping company onto a hard drive and transferred them to his own consulting firm – but then died while the investigation was underway. more
Yet Another USB Cautionary Tale
Mr Burgess (ASIO Director General Mike Burgess) referenced an unnamed Australian company that found global success making a product "similar to a motion detector" before their sales suddenly dropped.
"A little while later, their product started being returned to the factory because they were broken," he said.
"When they opened their branded products, they discovered they weren't their branded products, because the components were inferior, they were exact knock-offs."
The problem was eventually traced to an international conference, where someone had offered to share information with one of the company's employees by plugging a USB into their laptop.
"That USB downloaded malware onto that laptop, which later on, when they were connected back to their corporate network, was used to steal their intellectual property," he said.
"That intellectual property was passed from the intelligence services to state-owned enterprise that mass-produced the goods and sold them on the market that undercut them." more
• USB – Hacked Charging Cables
• USB – Malicious Spy Cable Detector Instructions
• USB – General Memory Stick Warning
• USB – NSA Type Cable Bug – $6.74
Extra USB Spy News - Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. "The attacker covertly spied on and harvested sensitive data from APAC government entities by exploiting a particular type of secure USB drive, protected by hardware encryption to ensure the secure storage and transfer of data between computer systems," Kaspersky said in its APT trends report for Q3 2023. more
Monday, October 16, 2023
The CARVER Mindset: How to Think Like a Spy - FREE
Luke Bencie (Mr. Carver Mindset), is a really smart guy. His book, Among Enemies: Counter-Espionage for the Business Traveler which first introduced me to him is excellent. Check out his other books, too. His Monday morning emails are always inspiring. I look forward to receiving them. Great way to start the week. The sign-up is at the bottom of this page.
CARVERCON 2023 is coming November 1st (Day of the Dead).
Friday, October 13, 2023
Smartphone Security: Delete These Apps
Some of the most popular apps you love and have come to rely on could be posing more of a danger than they're worth. Here's what you need to know. ...some of those apps that you love and have come to rely on could actually be putting you at risk... We’ve (Reader's Digest) collected information about some of the worst offenders so that you can make an educated decision about which apps you trust with your privacy and which ones need to go...
CamScanner
Ana Bera is a cybersecurity expert with Safe at Last. She identified CamScanner, an app meant to imitate a scanner with your phone, as one of the apps consumers should be concerned about. “Cybersecurity experts have found a malicious component installed in the app that acts as a Trojan Downloader and keeps collecting infected files,” she explains. “This kind of app can seriously damage your phone and should be de-installed instantly. Luckily, once you remove it from your phone, it is highly unlikely that it will continue harming you.”
Weather apps
“Check your weather app,” says Shayne Sherman, CEO of TechLoris. “There have been several different weather apps out there that have been laced with Trojans or other malwares.” While the most benign of these claims to take your information purely for weather accuracy, he calls that questionable. “Watch your local forecast instead, and if you have Good Weather, delete it now,” he advises. “That one is especially dangerous.”
Look, we all love our social networking apps. But cybersecurity expert Raffi Jafari, cofounder and creative director of Caveni Digital Solutions, says, “If you are looking for apps to delete to protect your information, the absolute worst culprit is Facebook. The sheer scale of their data collection is staggering, and it is often more intrusive than companies like Google. If you had to pick one app to remove to protect your data, it would be Facebook.”
“This is a call to action for users who may be living under a rock and unaware of the vulnerabilities that were disclosed earlier this year,” says Michael Covington, VP of Product for mobile security leader Wandera. “The vulnerabilities with WhatsApp—both iOS and Android versions—allowed attackers to target users by simply sending a specially crafted message to their phone number. Once successfully exploited, the attackers would be granted access to the same things WhatsApp had access to, including the microphone, the camera, the contact list, and more.”
Whatsapp and Instagram are both owned by Facebook, which is part of what makes them all a risk. Dave Salisbury, director of the University of Dayton Center for Cybersecurity and Data Intelligence, says that Instagram “requests several permissions that include but are not limited to modifying and reading contacts and the contents of your storage, locating your phone, reading your call log, modifying system settings, and having full network access.” Plus Nine More
Stores Silently Deploying Facial Recognition to Spy on Shoppers
Cameras are being used not just to catch persistent shoplifters, but also to monitor shoppers and analyze their emotions, so that stores can deliver personalized adverts on screens inside the store, George warned...
‘But it’s also being used for marketing purposes, they are gathering information on shoppers and seeing what they are buying and not buying - and using AI tools to analyse the emotions of shoppers and see what sort of ads to direct at them.’ more
Intense Competition Leads to Attempted Corporate Espionage
First, prior to the Zoom meeting, Arthur AI employees recognized that OneOneThree had no website. The Timesarticle says that Fung told Arthur AI at the time that OneOneThree was in “stealth mode,” which is why it had no website. Then, when Arthur AI asked Fung to sign a nondisclosure agreement (NDA), he reportedly asked Arthur AI to “hold off on the NDA,” and Arthur AI agreed.
Despite these issues, a Zoom meeting was arranged to demo the technology. Fung said Karina Patel, OneOneThree’s “main engineer,” would dial in to the meeting. However, during the Zoom meeting, an attendee logged in under the name of Aparna Dhinakaran, which an Arthur AI employee immediately recognized as a founder of Arize AI, a rival startup. When recognized, the attendee quickly logged off. Arthur AI later deduced that Fung was, in fact, an employee of Arize AI named Dat Ngo, and OneOneThree was an inactive company of his.
After the call concluded, one of Arthur AI’s employees messaged Ngo via LinkedIn direct messaging. Ngo responded by trying to recruit the Arthur AI employee, according to the Times article. more
Lessons Learned:
- Require NDAs Every Time.
- Perform Proper Due Diligence and Act Consistently With Your Findings.
- Only Use Secure Communication Channels and Restrict Recording.
- Train Employees on Spotting and Responding to Potential Threats.
- Conduct a Prompt and Careful Investigation Into Suspected Activity.
Apple AirTag: Police Official Accused of Stalking
The female officer who accused Labrada of stalking contacted Ontario police after she discovered an AirTag — a small tracking device that can be attached to personal items — among her possessions, according to two sources familiar with the case.
A group of officers from a since-disbanded San Fernando Valley gang unit is under investigation for, among other misconduct, allegedly using the devices to track suspects without court authorization...
Ontario police had been investigating the stalking allegations, but the San Bernardino County district attorney’s office said Wednesday it did not have enough evidence to pursue charges against Labrada. more
Monday, October 9, 2023
China Is Becoming a No-Go Zone for Executives
“There is a very significant cautionary attitude toward travel to China,” said Tammy Krings, chief executive of ATG Travel Worldwide, which works with large employers around the world. “I would advise mission-critical travel only.” Krings said she has seen a roughly 25% increase in cancellations or delays of business trips to China by U.S. companies in recent weeks. more
Where The Spies Are
Details: European states have been actively countering the Russian intelligence network, expelling employees of Russian embassies since the beginning of Russia's full-scale invasion of Ukraine in February 2022.
Fine... Feathered Drones Now
Earlier this year we revealed creepily realistic drones made from dead birds were being developed by scientists. more
How New Corporate Espionage Techniques Are Born, or... Their Next App Attack
Wednesday, October 4, 2023
If Ants Can be Tricked, What Chance do Corporations Have?
In a study in the journal Science, researchers report that blue butterfly caterpillars infiltrate red ant colonies and grub food by mimicking the raspy sound of the ant queen.
It’s good to be the Queen. You get fed and cared for and generally treated like royalty. But if you’re a blue butterfly caterpillar, you can get the same benefits by just pretending to be queen. Because these crafty caterpillars trick ants into feeding them—by mimicking the sound of their queen.
Ants are social creatures whose colonies contain a queen ant, and hordes of worker ants who feed the queen and take care of all her young. Blue butterfly caterpillars have come up with clever ways to exploit that system. These parasitic caterpillars take up residence in the nests of red ants. And they mooch free meals in part by waggling their heads to beg for food like all the other ant grubs.
- Your company is filled with hard-working, innocent, social creatures.
- Anyone bent on corporate espionage knows they just have to blend in.
- They will listen to your sounds.
- They will exploit your system.
- They will imitate loyalty.
- They will eat your lunch.
- Fight back.
Monday, October 2, 2023
FutureWatch - Robot Eavesdropping Microphone Smart Swarms
Each of the circular, wheeled robots is about an inch across. After deployment from a charging station, they all travel in different directions, emitting high frequency sounds to communicate with one another and make sure they are spread out as far as possible from one another. These high-pitched chirps also keep the robots from falling off of tables or bumping into other obstacles.
Monday, September 25, 2023
Legacy Systems Threaten Security in Mergers & Acquisitions
We have seen two primary trends throughout 2023:
– Threat groups are closely following news cycles, enabling them to quickly target entire portfolios with zero-day attacks designed to upend aging technologies — disrupting businesses and their supply chains.
– Corporate espionage cases are also on the rise as threat actors embrace longer dwell times and employ greater calculation in methods of monetizing attacks. more
Malaysian Police Investigate Spycam Found in Newlywed Couple’s Airbnb
The device was installed inside a wall power socket in a room of a lodging establishment in Sabah
The case came to light after the tourists shared their ordeal on Chinese social media
Malaysian police are looking for those responsible for placing a hidden camera within a wall power socket in a room of a lodging establishment in Sabah state where a newlywed Chinese couple had stayed in earlier this month...
A probe had been conducted at the said premises, he said, adding they have seized the spycam in question. more
Disrupting Time: Industrial Combat, Espionage, and...
Secret ‘James Bond’ Tunnels May Become a Tourist Attraction
A subterranean space once used by British spies has been sold to fund manager Angus Murray, who has grand ambitions for it.
World Spy News Roundup
5 Bulgarians charged with espionage | Spying for Russia more
EU tells China spy and sanction laws could spook investors more more
10 Underrated Movies Based on Actual Real-Life Spies more
Spies in America who stole and sold U.S. secrets | 60 Minutes YouTube
Hamas Operative Arrested on Suspicion of Spying for Israel, Lebanese Media Report more
An award-winning London beautician accused of spying for Russia told her customers she had no interest in politics. more more
Ethiopian Contractor Charged For Spying In US more U.S. government contractor was charged with delivering national defense information to aid a foreign government. more
Exclusive Interview With Ukraine’s Spy Boss From His D.C. Hotel Room more
The Spy Inside Your Smartphone more
Norway drops spying claims against foreign student, says he's being held now for a 'financial crime' more


































