If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.
Wednesday, August 14, 2024
Thousands of Corporate Secrets Were Left Exposed
If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.
Increase Your Spy Resistance - Dumb Down Your Mobile Phone
Pakistan's Former Spy Chief Arrested
FutureWatch: The AI Polygraph, or Who's Zoomin' You
How it Works
PolygrAI is a fusion of advanced computer vision algorithms and extensive psychological research designed to discern the validity of human expressions. The software meticulously analyzes a spectrum of physiological and behavioral indicators correlated with deceit. For instance, when a person tells a lie, they might unconsciously exhibit decreased blinking or an erratic gaze—these are the tell-tale signs that PolygrAI detects.
The system vigilantly computes a ‘trustfulness score’ by monitoring and interpreting subtle changes in facial expressions, heart rate variability, and eye movement patterns. This score is adjusted in real-time, offering a dynamic gauge of credibility.
Furthermore, PolygrAI assesses the voice for sudden shifts in tone and pitch—parameters that could betray an individual’s composure or reveal underlying stress. more Lifetime access ($100) for beta testers.
![]() |
| Click to enlarge. |
History: How to Build a Bugging Device in 1917
Want to build a bug; known as a Detectograph back in 1917?
Just write to a magazine, like The Electrical Experimenter, and they would tell you. Things were pretty simple back then, but the parts were not cheap. The average full-time worker's wage was $13.21 per week.
Security Camera Catch: Checking Her Mate... with poison
Amina Abakarova, a 40-year-old chess coach from Makhachkala in the Russian Republic of Dagestan, is accused of trying to poison her rival, 30-year-old Umayganat Osmanova...
Wednesday, August 7, 2024
How to Fight a Corporate Espionage Accusation
What Constitutes Corporate Espionage Fraud?
Corporate espionage fraud involves illegally obtaining confidential business information from a competitor to gain an unfair advantage. This can include:
- Stealing trade secrets or proprietary technology
- Hacking into computer systems to access sensitive data
- Using deception to obtain confidential documents
- Bribing or blackmailing employees to reveal inside information
- Industrial sabotage to damage a competitor’s operations
1. Lack of Intent
2. Information Was Not Actually a Trade Secret
4. Public Availability
5. Whistleblower Protections
6. Statute of Limitations
Key Legal Precedents in Corporate Espionage Cases
- United States v. Hsu (1999): Established that attempted corporate espionage is prosecutable, even if no actual trade secrets were obtained.
- United States v. Chung (2011): Clarified that the government must prove the defendant knew the information was a trade secret, not just confidential.
- United States v. Aleynikov (2012): Found that software source code did not qualify as a trade secret under the Economic Espionage Act (later overturned).
- United States v. Nosal (2016): Ruled that the Computer Fraud and Abuse Act applies to theft of trade secrets by former employees.
- Challenging the evidence:
- Scrutinize how the evidence against you was obtained and push to suppress any improperly gathered information.
- Negotiating with prosecutors
- Presenting alternative explanations:
- Demonstrating lack of economic benefit
- Highlighting inadequate security measures
- Leveraging expert witnesses
- Pursuing civil resolutions
Russian Spy Parents Reveal Identity to Their Children
Among those swapped were Anna Dultseva and Artyom Dultsev, Russian spies who had been posing as an Argentinian couple in Slovenia. Not even their school-age children, who spoke Spanish with their parents, knew their true origins — until the parents revealed their identities after their release on the plane to Russia. more
How to Boost an Auction - Mention the Word Spy
Doc Boners: Recording Patients with Hidden Cameras
Doc Boner II: MA - The owner of a Peabody chiropractic business is facing charges that he recorded nude visitors in his clinic after a hidden spy camera was found in a bathroom last week. more
FutureWatch: Eavesdropping on YOU, by Looking at Your Face
Though Kosinski says his research should be seen as a warning, his work can feel more like a Pandora Box. Many of the use cases for his research seems pretty bad (like AI security scanners and robcops), and simply publishing about them may inspire new tools for discrimination. (Oops, forget what I just said.)
There's also the issue that the models aren't 100 percent accurate (yet), which could lead to people getting wrongly targeted. (e.g. Being a treehugger is not a sexual preference.) more
Clickbait of the Week: How to Build a (Code Cracking) Photonic Quantum Computer
- No. This is not an https://www.instructables.com/ article.
- Yes, the title is a lie.
Friday, August 2, 2024
Greenbrier Hotel Up for Public Auction
So, why is this news?
One of the great vestiges of the Cold War is the Greenbrier bunker, a facility built to house all 535 members of Congress in the event of a nuclear attack.
Greenbrier was chosen because of its location—relatively close and accessible to Washington, but far enough away to be safe from an atomic bomb—and because of its prior relationship with the United States government. During World War II, Greenbrier had served as an internment facility for Japanese, Italian, and German diplomats and then as a military hospital, where Eisenhower himself was at one time a patient. Although it returned to its original function as a hotel after the war, government officials occasionally held conferences at Greenbrier. more
Free TSCM AI Knowledge Wiki
The website, counterespionage.net, provides a comprehensive range of resources related to Technical Surveillance Countermeasures (TSCM), which can be considered as a knowledge wiki for several reasons:
- Informative Articles: It features detailed articles explaining what TSCM is and its importance in protecting corporate privacy and intellectual property. For example, the article on What Is TSCM? outlines the holistic approach needed for effective TSCM evaluations.
Free Resources: The site offers free TSCM security reports, publications, and videos that educate users about various aspects of surveillance and counter-surveillance techniques. You can find these resources in the TSCM Information section.
Guides and Tips: It includes practical guides such as the Security Director’s Guide to Discussing TSCM with Management and tips for businesses on counterespionage, which serve as valuable educational tools.
Case Studies and Testimonials: The website also shares case studies and client testimonials that provide real-world examples of TSCM applications, enhancing the learning experience for users.
FAQs and Expert Insights: The presence of a FAQ section allows users to get quick answers to common questions about TSCM, further contributing to its role as a knowledge base.
A $500 Open Source Tool Lets Anyone Hack Computer Chips With Lasers
At the Black Hat cybersecurity conference in Las Vegas next week, Sam Beaumont and Larry “Patch” Trowell, both hackers at the security firm NetSPI, plan to present a new laser hacking device they're calling the RayV Lite.
This Week in Spy News
- Canada women advance in Olympic soccer as emails show their coach supported spying. more
- Like a spy thriller: Amazing details about assassination of Hamas leader Haniyeh in Tehran start to emerge. more
- Moldova expels Russian diplomat and calls in envoy amid spy case. more
- Suspected Russian spy locked up in Brooklyn freed in prisoner swap for Evan Gershovich, Paul Whelan more
- Chinese Woman, 20, Reports Parents To Police After They Install Spy Camera In Her Bedroom more
- Slovenian court convicts two Russians of espionage more
- French citizen accused of espionage in Russia denied bail. more
- The Philippine National Police is looking into the possibility that gadgets seized from a Chinese national were being used for scamming and espionage activities. more Security Scrapbook Analysis: The equipment appears to have been obtained from pitsms.top, a Chinese manufacturer of a cellular "Fake Base Station" systems. This could be either a cyber-crime story, or a spy story, depending upon the intended use. Stay tuned. We will update you as this develops. You can watch the Fake Base Station being made, here.
Behind the Prisoner Swap: Spies, a Killer, Secret Messages and Unseen Diplomacy
Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS
This process consists of two main phases: negotiation of encryption parameters and performing a key exchange using the Internet Key Exchange protocol, followed by authentication....
These findings highlight the systemic flaws in the implementation of VoWiFi, which could make users vulnerable to man-in-the-middle attacks, and communication security is compromised on a global scale, consequently requiring better security measures in VoWiFi protocols and implementations. more
Wednesday, July 31, 2024
$2 billion Corporate Espionage Verdict Overturned by Appeals Court
The award from 2022 had been the largest damages verdict in Virginia court history, the Court of Appeals of Virginia said in the decision...
McLean, Virginia-based Appian had said in a 2020 lawsuit that Pegasystems hired a contractor to steal confidential information from Appian’s software platform in order to improve its own products and better train its sales force...
Appian said that Cambridge, Massachusetts-based Pegasystems referred internally to the contractor as a spy and to its scheme as “Project Crush,” with Pegasystems employees using fake credentials to access Appian’s software. Pegasystems characterized “Project Crush” as competitive research in a 2022 statement...
Pegasystems’ CEO said in a statement following the verdict that Appian’s CEO “could not identify one trade secret that Pega had allegedly misappropriated” during the trial. more
Tuesday, July 30, 2024
Interesting: AI Can Reveal What’s on Your Screen (sort of)
Federico Larroca at the University of the Republic in Montevideo, Uruguay, and his colleagues have developed an AI model that can reconstruct an image from digital signals that were intercepted a few metres away from an HDMI cable...
Around 30 per cent of characters were misinterpreted by the eavesdropping process, but that is low enough that humans can read most of the text accurately, the team says. This error rate is about 60 per cent lower than the previous state-of-the-art attack, the researchers add. more
Karma Files: Multi-platform Spyware Provider Spytech Gets Hacked
Tag You're It
The spray, called SmartTag, contains a unique traceable forensic code tied to the bottle, enabling the police department to easily decide where and when the individual was tagged. Only an extremely small amount of liquid is needed to be able to identify whether or not someone or something has been sprayed.
The liquid also cannot be washed off nor can it be detected by the naked eye, making it a suitable tool for law enforcement. more
Saturday, May 15, 2010 - SmartWater - "I've been slimed!"
FutureWatch: AI to the Max - Will Intelligent Eavesdropping Bugs Be Possible?
As scientists continue to make advances using human tissue to grow brains in laboratories, one neuroscientist is naming the existential elephant in the room: could lab-grown brains ever become truly conscious?
Olympics: FIFA Hinders Canada’s chances with Punishments for Drone Spying
The punishment immediately and severely hurt the chances for a second consecutive gold medal for Canada, which won the Olympic tournament in Tokyo in 2021, a run that was immediately questioned as the drone scandal emerged. more
Saturday, July 20, 2024
One Way Corporate Espionage Spies Cover Their Tracks
From the IP vendor's ad...
"In the fiercely competitive business battlefield, information is power, and how to obtain and use this information has become a problem that every company needs to face. In this spy war without gunpowder, residential proxy IP is like an invisible cloak, providing strong protection and support for enterprises.
Residential proxy IP, as the name suggests, is to use the IP address of an ordinary home network environment for network access. Because these IP addresses come from real home users, they are difficult to identify and track. By using residential proxy IP, enterprises can hide their real IP address and avoid being discovered by competitors or network monitoring agencies. In this way, enterprises can access target websites, crawl data, analyze competitors' strategies, etc. more freely without worrying about being blocked by anti-crawler mechanisms or IP being blocked." more
Corporate Espionage: Steward Health Care Deployed Spy Outfits to Thwart Critics
In what resembles a poorly written spy novel, Steward's leadership hired agents who placed tracking devices on the car of a financial analyst, accessed a healthcare executive’s phone to potentially blackmail him and circulated an allegedly false wire transfer to frame a politician, a report said.
The videos and documents with the incriminating details were obtained by journalism outfit the Organized Crime and Corruption Reporting Project and shared with the Boston Globe, who investigated the case further.
According to reporters, Steward executives who deployed these intelligence firms prioritized paying their bills over all others, including invoices from vendors and suppliers. Monthly expenses for intelligence services reached as high as $440,000, and from 2019 to 2023, Steward allocated over $7 million to these operations.
As to the legality of all of this, because the spying and fraud took place in various jurisdictions globally, it may not be possible to prosecute anyone responsible. more
The Devil Wears Prada - So Do Spies
‘His cameras are everywhere’
The owner of a Martinsville security company was in court Friday, facing child pornography charges, including images he may have taken himself. Adam R. Anderson, 42, is pleading not guilty to these felony counts. Court documents reveal he’s also under investigation for allegedly spying on clients using his security systems.
Holly Clark signed up for Anderson Video Security and Alarm LLC after her garage was broken into a few years ago. Holly Clark signed up for Anderson Video Security and Alarm LLC after her garage was broken into a few years ago.
After meeting with tech experts, Clark said she believes he may still have ownership and access to the cameras within his company.
“The thing is, it’s not just me,” she said. “He put cameras in at the library, the city pool, and has allegations of child porn. Do you want his cameras at the city pool? His cameras are everywhere.”
Clark said she and other customers are considering a class action lawsuit against Anderson to get sole ownership of the installed security systems. more
Karma Files: Data Breach Exposes Millions of mSpy Spyware Customers
FutureWatch: Eavesdropping on the Mind Gets One Step Closer to Reality
Friday, July 5, 2024
Trinidad and Tobago: Bombshell Report on Elite Spy Unit
In a bombshell statement in Parliament on July 3, the head of the National Security Council (NSC), Dr Rowley, revealed for the first time details of the audit done by acting director of the SSA retired Brig Gen Anthony Phillips-Spencer, which painted an alarming state of affairs that went undetected for years under the current PNM administration.
The SSA is authorised to intercept communications, phone calls, WhatsApp, e-mails and other modes after obtaining court orders under the Interception of Communication Act. It was first established in 1995 primarily “to guide the formulation and implementation of national policies on illicit trafficking of dangerous drugs and related criminal activities.” more
Silicon Valley Steps Up Screening on Chinese Employees to Counter Espionage
While the enhanced screening is being applied to employees and applicants of all races, those with family or other ties to China are thought to be particularly vulnerable to pressure from the Beijing government.
But at least one Chinese computer science graduate student at a U.S. university is hoping to make his ties to China an asset. Zheng, who does not want to reveal his first name for fear of retaliation from the Chinese government, says he recently changed his focus to cybersecurity in hopes of improving his job prospects in the United States. more
US Aims To ‘Disrupt’ Chinese Spy Station In Cuba
The Center for Strategic and International Studies on Monday released a report alleging that Cuba in 2021 let China construct spy facilities on “the doorstep of the United States” that would allow Beijing to monitor air and maritime traffic up to 9,000 miles (14,500 kms) away by using radar.
At a press briefing on Tuesday, U.S. State Department principal deputy spokesman Vedant Patel said officials had already “talked about this a little bit more than a year ago” when reports of a Chinese base in Cuba nearly derailed a trip to Beijing by Secretary of State Antony Blinken. more
Tracking Devices Stymie Political Sign Thefts
The button-size geotracking device has become a popular tool in the rough-and-tumble world of local elections, where lawn signs often end up stolen, vandalized or run over. Candidates who have grown tired of dirty tricks are hiding AirTags in their signs, leading to digital dragnets when they go missing.
Tracking the device’s pings has led to the doorsteps of alleged sign snatchers and, in some cases, candidates’ opponents. The stings have left snatchers dumbfounded. Some have faced charges of theft, criminal mischief and receiving stolen property.
“I just wanted it to stop,” John Dittmore said of why he got an AirTag after several of his campaign signs vanished over three days in May. more
Sports: Germany Uses 1980's Pop Music to Prevent Rivals Spying
Reporters from Bild have chronicled how they were followed by two men while walking near the perimeter of the Adidas site in Herzogenaurach, Bavaria, on Wednesday, one of which was holding a phone blaring out the title song to a children’s television series (sing-a-long) and a song by a 1980s pop duo.
As well as the theme tune to Benjamin Blümchen, the unidentified individuals also played Cheri Cheri Lady by Modern Talking, much to the reporters’ bemusement. (sing-a-long)
The deployment of such extreme measures, apparently in order to drown out any instructions Germany manager Julian Nagelsmann and his coaches may issue to his squad, coincided with the build-up to the country’s crunch Euro 2024 quarter-final against Spain on Friday. more
Monday, July 1, 2024
Security Director Alert: China Enforcing Electronic Device Inspection Law
The Ministry of State Security is implementing the legislation that stipulates powers to crack down on spying.
The law states procedures to inspect mobile phones, personal computers and other devices of individuals and organizations. more
Lawsuit Claim: Shopping App Temu - “Dangerous Malware,” Spying on Your Texts
Griffin cited research and media reports exposing Temu's allegedly nefarious design, which "purposely" allows Temu to "gain unrestricted access to a user's phone operating system, including, but not limited to, a user's camera, specific location, contacts, text messages, documents, and other applications."
"Temu is designed to make this expansive access undetected, even by sophisticated users," Griffin's complaint said. "Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place." more
TeamViewer Confirms Cyberattack
App Slammed for Spying at Popular Nightclubs Using 'Hidden Cameras'
2night, the startup behind the app, had hoped that the service would promote nightlife in the area, allowing users to check livestreams of the bars and clubs to determine if they had the right vibe.
But bargoers were quick to lash out after they learned that they were being recorded without their permission, with some going so far as to liken the service to 'Big Brother.' more
THOR: Disables Drone Swarm Attacks
The Department of Defense is exploring options to protect our warfighters further. Enter THOR, stage right. Tactical, High-power, Operational Responder (THOR), is a high-power microwave counter-drone weapon that the Air Force Research Lab has demonstrated for effective use against realistic targets. Watch this video to see how THOR tracks and turns off entire drone swarms. video
Bugging Did Not Pay
The court was told Mr McCormack received a series of messages from Jackson, from Macclesfield, Cheshire, showing routes he had taken to and from his home. They also included the times of the journeys and messages from Jackson saying: ''I know where you are - I know what you are doing.'' more
30 Spy Movies That Will Make You Want to Be a Secret Agent
Indeed, there are near-endless lists of spy films, but if you’re looking for the top choices, the ones that will captivate your senses, that aren’t just background noise, check out... more
2. An elegant American interpreter living in Paris, outfitted in Givenchy.
3. In Prague, Czech Republic, a group of IMF agents.
4. A CIA intelligence analyst tracking the location of Osama bin Laden.
5. Extraterrestrials live on Earth, often wearing human shells blend into society.
6. An unnamed man is pulled out of an Italian fishing boat.
7. Joins forces with Russian agent Anya Amasova.
8. Russian operative claims that a mole named Salt plans on killing...
9. Running through the jungles of Uganda, assigned to spy on a terrorist cell.
10. During the fall of the Berlin Wall, sent to Germany to recover microfilm.
11. At the start, the villain escapes in a rocket and cryogenically freezes himself.
12. Captured by the evil TV host Fegan Floop.
13. A hard drive containing details of undercover agents was stolen.
14. Galahad, is in search of a new agent.
15. A girl living in a remote Finnish forest who is raised to be a lethal assassin.
16. They have no recollection of what their superiors said happened in Korea.
17. On vacation in London. Sees a bomb explode outside Buckingham Palace.
18. An advertising executive that is mistaken for government agent.
19. An ordinary man, at a music hall where shots are suddenly fired.
20. A mission to stop a terrorist group called the Apostles.
21. A New York lawyer enlisted by the CIA to defend a Russian spy.
22. He’s brought back to uncover a mole at the British Secret Service.
23. He is investigating the kidnapping of scientists who reappear brainwashed.
24. CIA codebreaker finds his colleagues murdered in the New York office.
25. A surveillance expert who is employed track a young couple.
26. A spy living a double life tracks nuclear rockets from jihadist Salim Abu Aziz.
27. CIA agent posing as an aid worker. Goal: enforce U.S. policies on Vietnam.
28. American daughter of a Nazi, enlisted to spy on escaped war criminals.
29. A World War II veteran charged with a superhuman serum.
30. Connects deaths to a new drug, Dypraxa. Uncovers British Intelligence.
Thursday, June 20, 2024
Security Cam Shoots Paintballs Like in 'Home Alone'
The track-and-shoot home security cam promises action, but we spot real-world problems after its hugely successful Kickstarter.*
What happens when you combine a paintball gun with a home security cam and smart tracking? All the potential chaos of the Eve PaintCam, an ambitious crowdsourced security camera equipped with smart detection -- and a paintball firing system to mark and scare away intruders.
From creator OZ-IT on Kickstarter and elsewhere, the Eve PaintCam wants people to live out their fantasies of total property control. It even promises face detection to avoid hitting friends (or specifically to hit friends, depending on your mood). more
Caught on Spycam: Lawmaker Pours Water into Colleague's Bag
State Rep. Mary Morrissey said she was “truly ashamed” of childishly targeting state Rep. Jim Carroll, who dealt with a soaked bag on numerous occasions over the last several months, in what he called “torment.”
“I have given my sincere apology to Jim directly and publicly and will be working towards resolution and restoration through our legislative process,” Morrissey said in front of fellow lawmakers. more
Surveillance News in the Digital World
• AI companies, including Google and OpenAI, are intensifying their screening of new hires due to the threat of Chinese espionage. more
• MICROSOFT ADMITS THAT MAYBE SURVEILING EVERYTHING YOU DO ON YOUR COMPUTER ISN’T A BRILLIANT IDEA... After announcing a new AI feature that records and screenshots everything you do, Microsoft is now delaying its launch after widespread objections. The company broke the news in a blog post detailing its decision not to ship the feature, dubbed Recall, on new computers so that it can continue to "leverage the expertise" of its Windows Insider Program (WIP) beta-testing community. more
• Zoom wants to make sure you’re paying attention. The company filed a patent application for “scrolling motion detection” in video calls.• Chinese Spy Tech Driving Junta Internet Crackdown: Justice For Myanmar... China supplied the spy technology and technicians that allowed Myanmar’s junta to intensify its internet surveillance and censorship late last month, Justice for Myanmar (JFM) said on Thursday, warning that China’s increased support for the junta will cost more lives. This support will allow the junta – which has imprisoned more than 25,000 people since the 2021 coup – to identify and jail more people who express dissent. more
• Canada - Public servants uneasy as government 'spy' robot prowls federal offices... A device federal public servants call "the little robot" began appearing in Gatineau office buildings in March. It travels through the workplace to collect data using about 20 sensors and a 360-degree camera, according to Yahya Saad, co-founder of GlobalDWS, which created the robot. "Using AI on the robot, the camera takes the picture, analyzes and counts the number of people and then discards the image," he said. more













































