Wednesday, August 14, 2024

Thousands of Corporate Secrets Were Left Exposed

This Guy Found Them All...


If you know where to look, plenty of secrets can be found online. Since the fall of 2021, independent security researcher Bill Demirkapi has been building ways to tap into huge data sources, which are often overlooked by researchers, to find masses of security problems. This includes automatically finding developer secrets—such as passwords, API keys, and authentication tokens—that could give cybercriminals access to company systems and the ability to steal data.

In total, Demirkapi has found more than 15,000 active secrets of all kinds.

Within the vast number of exposed keys were those that could give an attacker access to the digital assets of companies and organizations, including the potential to obtain sensitive data. For instance, a member of Nebraska’s Supreme Court had uploaded details of usernames and passwords linked to its IT systems, and Stanford University Slack channels could be accessed using API keys. more

Increase Your Spy Resistance - Dumb Down Your Mobile Phone

The MP02 4G phone from Punkt .... It's a 'dumbphone' in the true sense of the word – it can make calls and send messages (though SMS or Pigeon), and offers a calendar too. 

But the Punk MP02's secret weapon is its 4G hotspot. This means when I want to switch off, I can stick my sim card in the Punkt phone and 'disconnect'. But if I'm carrying, say, my iPad mini in my bag, I can tether the 4G connection to it at the press of a button, giving my access to the likes of music and maps when needed.

But perhaps the best thing about the Punkt MP02 is the aesthetic. Conceived by industrial designer Jasper Morrison, the phone has a delightful retro and somewhat brutalist 1970s-inspired look. I've been asked whether it's a calculator, which just about sums it up. In a world of 'Y2K' dumbphone designs, it's refreshing to see something that stands out. more
Bonus: The MP02 is the first voicephone to offer a downloadable privacy feature that uses the Signal protocol to provide free, encrypted Internet-based calls and texts worldwide via Wi Fi or mobile data (subject to data charges).

Pakistan's Former Spy Chief Arrested

Pakistan's former spymaster - who was once tipped for the army's top job - has been taken into military custody. 

Lt Gen Faiz Hameed has been accused of abusing his power and raiding a private property development business during his time as head of the Inter-Services Intelligence (ISI) agency. 

It is incredibly rare for someone of Gen Hameed's rank to be arrested in Pakistan, and has sparked widespread speculation, with many linking the move to his close ties with former prime minister Imran Khan...Gen Hameed could not be reached for comment. more

FutureWatch: The AI Polygraph, or Who's Zoomin' You

PolygrAI - A Technology That Provides Real-Time Risk Assessment And Sentiment Analysis

How it Works

PolygrAI is a fusion of advanced computer vision algorithms and extensive psychological research designed to discern the validity of human expressions. The software meticulously analyzes a spectrum of physiological and behavioral indicators correlated with deceit. For instance, when a person tells a lie, they might unconsciously exhibit decreased blinking or an erratic gaze—these are the tell-tale signs that PolygrAI detects.

The system vigilantly computes a ‘trustfulness score’ by monitoring and interpreting subtle changes in facial expressions, heart rate variability, and eye movement patterns. This score is adjusted in real-time, offering a dynamic gauge of credibility.

Furthermore, PolygrAI assesses the voice for sudden shifts in tone and pitch—parameters that could betray an individual’s composure or reveal underlying stress. more Lifetime access ($100) for beta testers.
Click to enlarge.




History: How to Build a Bugging Device in 1917

Want to build a bug; known as a Detectograph back in 1917? 

Just write to a magazine, like The Electrical Experimenter, and they would tell you. Things were pretty simple back then, but the parts were not cheap. The average full-time worker's wage was $13.21 per week.



Security Camera Catch: Checking Her Mate... with poison

A chess player has been suspended by the Russian Chess Federation and is reportedly facing time in jail after she allegedly tried to poison her rival at the chessboard during a tournament.

Amina Abakarova, a 40-year-old chess coach from Makhachkala in the Russian Republic of Dagestan, is accused of trying to poison her rival, 30-year-old Umayganat Osmanova...

Security camera footage shows the incident where Abakarova calmly walked over to the board where Osmanova was supposed to appear 20 minutes later. It was reported that she'd previously asked if cameras were in operation and been told that they weren't. She then smeared what is said to be potentially deadly mercury from a thermometer. more

Wednesday, August 7, 2024

How to Fight a Corporate Espionage Accusation

via SPODEK LAW
What Constitutes Corporate Espionage Fraud?
Corporate espionage fraud involves illegally obtaining confidential business information from a competitor to gain an unfair advantage. This can include:
  • Stealing trade secrets or proprietary technology
  • Hacking into computer systems to access sensitive data
  • Using deception to obtain confidential documents
  • Bribing or blackmailing employees to reveal inside information
  • Industrial sabotage to damage a competitor’s operations
Common Defenses Against Corporate Espionage Charges
1. Lack of Intent
2. Information Was Not Actually a Trade Secret
4. Public Availability
5. Whistleblower Protections
6. Statute of Limitations

Key Legal Precedents in Corporate Espionage Cases
  • United States v. Hsu (1999): Established that attempted corporate espionage is prosecutable, even if no actual trade secrets were obtained.
  • United States v. Chung (2011): Clarified that the government must prove the defendant knew the information was a trade secret, not just confidential.
  • United States v. Aleynikov (2012): Found that software source code did not qualify as a trade secret under the Economic Espionage Act (later overturned).
  • United States v. Nosal (2016): Ruled that the Computer Fraud and Abuse Act applies to theft of trade secrets by former employees.
Strategies for Defending Against Corporate Espionage Charges
  • Challenging the evidence: 
  • Scrutinize how the evidence against you was obtained and push to suppress any improperly gathered information.
  • Negotiating with prosecutors
  • Presenting alternative explanations:
  • Demonstrating lack of economic benefit
  • Highlighting inadequate security measures
  • Leveraging expert witnesses
  • Pursuing civil resolutions
Greater detail appears in the original article, here.

Russian Spy Parents Reveal Identity to Their Children

How would you react if you found out your parents were foreign spies from a country where you couldn’t even speak the language? 

The prisoner exchange that secured the freedom of journalists Evan Gershkovich and Alsu Kurmasheva, as well former Marine Paul Whelan and more than a dozen others from Russian captivity also generated one mind-boggling anecdote seemingly straight out of a Soviet-era spy novel.

Among those swapped were Anna Dultseva and Artyom Dultsev, Russian spies who had been posing as an Argentinian couple in Slovenia. Not even their school-age children, who spoke Spanish with their parents, knew their true origins — until the parents revealed their identities after their release on the plane to Russia. more

How to Boost an Auction - Mention the Word Spy

The holder of Jeffrey Epstein's "little black book" believes it could hold the answer to suspicions that the late sex offender was a foreign spy

Eager for the cryptic scribbles and numbers to be investigated, the anonymous owner is putting the book up for online public auction on Aug. 16, with the goal of selling it to somebody capable of tracking down those named in it. more

Doc Boners: Recording Patients with Hidden Cameras

CA - An email sent to patients of a California chiropractic clinic informed them that a hidden camera was found inside an office bathroom
and a chiropractor was arrested, according to a new lawsuit.

Dr. Nicholas Vanderhyde, 40, who was arrested in June, is accused of “strategically” hiding the camera in a cabinet to record patients, including children, and their families undressing at The Joint Chiropractic’s office in Valencia, a lawsuit filed in California Superior Court in Los Angeles County says...

According to the complaint, The Joint Chiropractic knew Vanderhyde was a sexual “predator” before another employee discovered the camera, equipped with a battery pack, inside a cabinet. more

Doc Boner II: MA The owner of a Peabody chiropractic business is facing charges that he recorded nude visitors in his clinic after a hidden spy camera was found in a bathroom last week. more

Doc Boner III: NJ - Chiropractor charged after hidden camera found in bathroom at Springfield, NJ office. more

In other recent spy cam news...

FutureWatch: Eavesdropping on YOU, by Looking at Your Face

A Stanford University psychologist named Michal Kosinski claims that AI he's built can detect your intelligence, sexual preferences, and political leanings with a great degree of accuracy just by scanning your face,
Business Insider reports.

Though Kosinski says his research should be seen as a warning, his work can feel more like a Pandora Box. Many of the use cases for his research seems pretty bad (like AI security scanners and robcops), and simply publishing about them may inspire new tools for discrimination. (Oops, forget what I just said.)

There's also the issue that the models aren't 100 percent accurate (yet), which could lead to people getting wrongly targeted. (e.g. Being a treehugger is not a sexual preference.) more

Clickbait of the Week: How to Build a (Code Cracking) Photonic Quantum Computer

Spoiler Alerts: 
via Photonics Spectra: 
Expectations for quantum computers are high: They are supposed to outperform digital computers and pave the way for solutions that go far beyond the capabilities that artificial intelligence already delivers

They are predicted to crack unbreakable codes, find new materials for superconductors, and help develop medicine for the next pandemic. 

These are only some of the envisioned outcomes. more

Friday, August 2, 2024

Greenbrier Hotel Up for Public Auction

The Greenbrier Hotel, owned by Gov. Jim Justice and his family, has been announced for auction on the courthouse steps late this month because of default, according to a legal advertisement placed in Lewisburg’s West Virginia Daily News. more

So, why is this news?

One of the great vestiges of the Cold War is the Greenbrier bunker, a facility built to house all 535 members of Congress in the event of a nuclear attack.

In 1955, Dwight D. Eisenhower instructed the Department of Defense to draft emergency plans for Congress in case of a nuclear strike. Even if Washington, DC was destroyed, American officials needed a procedure to maintain the continuity of government. As part of these efforts, the Army Corps of Engineers was charged with scouting the location of a nuclear bunker for the members of Congress. They ultimately selected the Greenbrier, a luxury resort in White Sulphur Springs, West Virginia.

Greenbrier was chosen because of its location—relatively close and accessible to Washington, but far enough away to be safe from an atomic bomb—and because of its prior relationship with the United States government. During World War II, Greenbrier had served as an internment facility for Japanese, Italian, and German diplomats and then as a military hospital, where Eisenhower himself was at one time a patient. Although it returned to its original function as a hotel after the war, government officials occasionally held conferences at Greenbrier. more 
Video of the bunker.
Time to sing-s-long! or sing-a-long with... a little darker number.

Free TSCM AI Knowledge Wiki

The website, counterespionage.net, provides a comprehensive range of resources related to Technical Surveillance Countermeasures (TSCM), which can be considered as a knowledge wiki for several reasons:
  1. Informative Articles: It features detailed articles explaining what TSCM is and its importance in protecting corporate privacy and intellectual property. For example, the article on What Is TSCM? outlines the holistic approach needed for effective TSCM evaluations.
  2. Free Resources: The site offers free TSCM security reports, publications, and videos that educate users about various aspects of surveillance and counter-surveillance techniques. You can find these resources in the TSCM Information section.

  3. Guides and Tips: It includes practical guides such as the Security Director’s Guide to Discussing TSCM with Management and tips for businesses on counterespionage, which serve as valuable educational tools.

  4. Case Studies and Testimonials: The website also shares case studies and client testimonials that provide real-world examples of TSCM applications, enhancing the learning experience for users.

  5. FAQs and Expert Insights: The presence of a FAQ section allows users to get quick answers to common questions about TSCM, further contributing to its role as a knowledge base.

Overall, the combination of educational content, practical resources, and expert insights makes this website a valuable TSCM knowledge wiki. more

A $500 Open Source Tool Lets Anyone Hack Computer Chips With Lasers

IN MODERN MICROCHIPS, where some transistors have been shrunk to less than a 10th of the size of a Covid-19 virus, it doesn't take much to mess with the minuscule electrical charges that serve as the 0s and 1s underpinning all computing. 

A few photons from a stray beam of light can be enough to knock those electrons out of place and glitch a computer's programming. Or that same optical glitching can be achieved more purposefully—say, with a very precisely targeted and well timed blast from a laser. Now that physics-bending feat of computer exploitation is about to become available to far more hardware hackers than ever before.

At the Black Hat cybersecurity conference in Las Vegas next week, Sam Beaumont and Larry “Patch” Trowell, both hackers at the security firm NetSPI, plan to present a new laser hacking device they're calling the RayV Lite. 

Their tool, whose design and component list they plan to release open source, aims to let anyone achieve arcane laser-based tricks to reverse engineer chips, trigger their vulnerabilities, and expose their secrets—methods that have historically only been available to researchers inside of well-funded companies, academic labs, and government agencies. more

This Week in Spy News

  • Canada women advance in Olympic soccer as emails show their coach supported spying. more
  • Like a spy thriller: Amazing details about assassination of Hamas leader Haniyeh in Tehran start to emerge. more
  • Moldova expels Russian diplomat and calls in envoy amid spy case. more
  • Suspected Russian spy locked up in Brooklyn freed in prisoner swap for Evan Gershovich, Paul Whelan more
  • Chinese Woman, 20, Reports Parents To Police After They Install Spy Camera In Her Bedroom more
  • Slovenian court convicts two Russians of espionage more
  • French citizen accused of espionage in Russia denied bail. more
  • The Philippine National Police is looking into the possibility that gadgets seized from a Chinese national were being used for scamming and espionage activities. more  Security Scrapbook Analysis: The equipment appears to have been obtained from pitsms.top, a Chinese manufacturer of a cellular "Fake Base Station" systems. This could be either a cyber-crime story, or a spy story, depending upon the intended use. Stay tuned. We will update you as this develops. You can watch the Fake Base Station being made, here.


Behind the Prisoner Swap: Spies, a Killer, Secret Messages and Unseen Diplomacy

A turning point came on June 25, when a group of C.I.A. officers sat across from their Russian counterparts during a secret meeting in a Middle Eastern capital.

The Americans floated a proposal: an exchange of two dozen prisoners sitting in jails in Russia, the United States and scattered across Europe, a far bigger and more complex deal than either side had previously contemplated but one that would give both Moscow and Western nations more reasons to say yes...

The Russian spies took the proposal back to Moscow, and only days later the C.I.A. director was on the phone with a Russian spy chief agreeing to the broad parameters of a massive prisoner swap. On Thursday, seven different planes touched down in Ankara, Turkey, and exchanged passengers, bringing to a successful close an intensive diplomatic effort that took place almost entirely out of public view. more

Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS

IPsec tunnels are employed by Voice over Wi-Fi (VoWiFi) technology to route IP-based telephony from mobile network operators’ core networks via the Evolved Packet Data Gateway (ePDG).

This process consists of two main phases: negotiation of encryption parameters and performing a key exchange using the Internet Key Exchange protocol, followed by authentication....

The risk is that these vulnerabilities could expose VoWiFi communications to MITM attacks, compromising data integrity or confidentiality, which is essential for better security in implementing VoWiFi solutions...

These findings highlight the systemic flaws in the implementation of VoWiFi, which could make users vulnerable to man-in-the-middle attacks, and communication security is compromised on a global scale, consequently requiring better security measures in VoWiFi protocols and implementations. more

Wednesday, July 31, 2024

$2 billion Corporate Espionage Verdict Overturned by Appeals Court

Software company Pegasystems convinced a Virginia appeals court on Tuesday to throw out a $2 billion jury verdict for rival Appian in a court battle over Pegasystems’ alleged theft of Appian’s trade secrets.

The award from 2022 had been the largest damages verdict in Virginia court history, the Court of Appeals of Virginia said in the decision...

McLean, Virginia-based Appian had said in a 2020 lawsuit that Pegasystems hired a contractor to steal confidential information from Appian’s software platform in order to improve its own products and better train its sales force...

Appian said that Cambridge, Massachusetts-based Pegasystems referred internally to the contractor as a spy and to its scheme as “Project Crush,” with Pegasystems employees using fake credentials to access Appian’s software. Pegasystems characterized “Project Crush” as competitive research in a 2022 statement...

Pegasystems’ CEO said in a statement following the verdict that Appian’s CEO “could not identify one trade secret that Pega had allegedly misappropriated” during the trial. more

Moral: Make sure your "trade secrets" meet the requirements of, and can be clearly identified as, Trade Secrets. more

Tuesday, July 30, 2024

Interesting: AI Can Reveal What’s on Your Screen (sort of)

Hackers can intercept electromagnetic radiation leaking from the cable between your monitor and computer and decode what you are seeing on screen with the help of artificial intelligence.
Such attacks are probably taking place in the real world, says the team behind the work, but ordinary computer users have little to worry about...

Federico Larroca at the University of the Republic in Montevideo, Uruguay, and his colleagues have developed an AI model that can reconstruct an image from digital signals that were intercepted a few metres away from an HDMI cable...

Around 30 per cent of characters were misinterpreted by the eavesdropping process, but that is low enough that humans can read most of the text accurately, the team says. This error rate is about 60 per cent lower than the previous state-of-the-art attack, the researchers add. more

Karma Files: Multi-platform Spyware Provider Spytech Gets Hacked

Second spyware provider hacked this month...
Minnesota-based spyware provider Spytech has been hacked, with files stolen from the company's servers containing detailed device activity logs from a global pool of mostly Windows PCs but also some Macs, Chromebooks, and even Android devices. 

The total number of spyware victims impacted by Spytech and noted by TechCrunch analyzing the scale of the breach is "more than 10,000 devices since 2013,"
and this cross-platform invasion of privacy stretches across the entire globe, including the US, EU, the Middle East, Africa, Asia, and Australia. 

Spytech provides a brand of spyware best known as "stalkerware" since it's typically installed by a person with physical access to the victim's device. more

Tag You're It

Police departments in the United Kingdom are using a “forensic spray”
to tag motorcyclists, e-bikes and other small vehicle riders that are causing a nuisance in Manchester.

The spray, called SmartTag, contains a unique traceable forensic code tied to the bottle, enabling the police department to easily decide where and when the individual was tagged. Only an extremely small amount of liquid is needed to be able to identify whether or not someone or something has been sprayed.

The liquid also cannot be washed off nor can it be detected by the naked eye, making it a suitable tool for law enforcement. more

Previously reported in the Security Scrapbook...
Saturday, May 15, 2010 - SmartWater - "I've been slimed!"

FutureWatch: AI to the Max - Will Intelligent Eavesdropping Bugs Be Possible?

SCIENTISTS ARE GROWING BRAINS IN LABS. COULD THEY BECOME CONSCIOUS? "IT HAS NO EYES, EARS, NOSE OR MOUTH — NOTHING'S COMING IN." (yet)

As scientists continue to make advances using human tissue to grow brains in laboratories, one neuroscientist is naming the existential elephant in the room: could lab-grown brains ever become truly conscious?

In an interview with Live Science, University of California at Santa Barbara neuroscientist Kenneth Kosik explained that as the science stands now, the facsimile brains made in labs aren't likely to achieve consciousness anytime soon. (Nothing to see here, don't worry, move on.)
These brain organoids, as the lab-grown brains are called, are created by taking someone's cells, converting them into stem cells, and differentiating those into neurons. more

Olympics: FIFA Hinders Canada’s chances with Punishments for Drone Spying

FIFA suspended Canada women’s soccer coach Bev Priestman for one year, deducted six points from the team’s Olympic group stage total and issued a fine
on Saturday in response to Canada flying a drone over New Zealand’s training sessions before the start of the Games.

The punishment immediately and severely hurt the chances for a second consecutive gold medal for Canada, which won the Olympic tournament in Tokyo in 2021, a run that was immediately questioned as the drone scandal emerged. more

Saturday, July 20, 2024

One Way Corporate Espionage Spies Cover Their Tracks

Residential proxy IP: The invisible cloak in corporate espionage.
From the IP vendor's ad...

"In the fiercely competitive business battlefield, information is power, and how to obtain and use this information has become a problem that every company needs to face. In this spy war without gunpowder, residential proxy IP is like an invisible cloak, providing strong protection and support for enterprises.

Imagine that you are an intelligence analyst at an emerging technology company, and your task is to collect and analyze the latest developments of competitors so that the company can make more informed decisions. However, the online world is not a smooth road, and your IP address can easily expose your true identity and intentions, making your actions subject to various restrictions. At this time, residential proxy IP is like a capable assistant, helping you to move forward invisibly in this spy war.

Residential proxy IP, as the name suggests, is to use the IP address of an ordinary home network environment for network access. Because these IP addresses come from real home users, they are difficult to identify and track. By using residential proxy IP, enterprises can hide their real IP address and avoid being discovered by competitors or network monitoring agencies. In this way, enterprises can access target websites, crawl data, analyze competitors' strategies, etc. more freely without worrying about being blocked by anti-crawler mechanisms or IP being blocked." more

Corporate Espionage: Steward Health Care Deployed Spy Outfits to Thwart Critics

Despite its financial turmoil and eventual bankruptcy, Steward Health Care allegedly spent millions spying on its adversaries, hiring intelligence companies to track and intimidate critics worldwide.


In what resembles a poorly written spy novel, Steward's leadership hired agents who placed tracking devices on the car of a financial analyst, accessed a healthcare executive’s phone to potentially blackmail him and circulated an allegedly false wire transfer to frame a politician, a report said.

The videos and documents with the incriminating details were obtained by journalism outfit the Organized Crime and Corruption Reporting Project and shared with the Boston Globe, who investigated the case further.

According to reporters, Steward executives who deployed these intelligence firms prioritized paying their bills over all others, including invoices from vendors and suppliers. Monthly expenses for intelligence services reached as high as $440,000, and from 2019 to 2023, Steward allocated over $7 million to these operations.

As to the legality of all of this, because the spying and fraud took place in various jurisdictions globally, it may not be possible to prosecute anyone responsible. more

The Devil Wears Prada - So Do Spies

Former Government Official Arrested For Acting As Unregistered Agent Of South Korean Government

U.S. Attorney Damian Williams said: “As alleged, Sue Mi Terry, a former CIA and White House employee, subverted foreign agent registration laws in order to provide South Korean intelligence officers with access, information, and advocacy

Terry allegedly sold out her positions and influence to the South Korean government in return for luxury handbags, expensive meals, and thousands of dollars of funding for her public policy program. 

 The charges brought should send a clear message to those in public policy who may be tempted to sell their expertise to a foreign government to think twice and ensure you are in accordance with the law.” more

‘His cameras are everywhere’

Clients worry as Martinsville security camera installer investigated for spying...
The owner of a Martinsville security company was in court Friday, facing child pornography charges, including images he may have taken himself. Adam R. Anderson, 42, is pleading not guilty to these felony counts. Court documents reveal he’s also under investigation for allegedly spying on clients using his security systems.

Holly Clark signed up for Anderson Video Security and Alarm LLC after her garage was broken into a few years ago. Holly Clark signed up for Anderson Video Security and Alarm LLC after her garage was broken into a few years ago.

After meeting with tech experts, Clark said she believes he may still have ownership and access to the cameras within his company.

“The thing is, it’s not just me,” she said. “He put cameras in at the library, the city pool, and has allegations of child porn. Do you want his cameras at the city pool? His cameras are everywhere.

Clark said she and other customers are considering a class action lawsuit against Anderson to get sole ownership of the installed security systems. more

Karma Files: Data Breach Exposes Millions of mSpy Spyware Customers

A data breach at the phone surveillance operation mSpy has exposed millions of its customers who bought access to the phone spyware app over the past decade, as well as the Ukrainian company behind it.

Unknown attackers stole millions of customer support tickets, including personal information, emails to support, and attachments, including personal documents, from mSpy in May 2024. While hacks of spyware purveyors are becoming increasingly common, they remain notable because of the highly sensitive personal information often included in the data, in this case about the customers who use the service.

The hack encompassed customer service records dating back to 2014, which were stolen from the spyware maker’s Zendesk-powered customer support system.

mSpy is a phone surveillance app that promotes itself as a way to track children or monitor employees. Like most spyware, it is also widely used to monitor people without their consent. more

FutureWatch: Eavesdropping on the Mind Gets One Step Closer to Reality

Mind-reading AI just got real! Researchers have created a revolutionary system that can recreate what you're looking at with amazing accuracy. And it’s works by only reading brain activity! 

This cutting-edge tech uses advanced algorithms to focus on the most important brain signals, allowing it to reconstruct images with uncanny precision. Imagine a future where you can control devices with your mind, upload memories to the cloud, or even communicate with others telepathically - this brings us one step closer to making it a reality! (via There's An AI For That)

Friday, July 5, 2024

Trinidad and Tobago: Bombshell Report on Elite Spy Unit

An audit into the Strategic Services Agency (SSA), one of key weapons in the state’s arsenal in the fight against crime, found it was being run under the influence of a religious cult comprising highly-trained military operators, armed to the teeth with the latest weaponry, on a treasonous mission to overthrow the Government.

In a bombshell statement in Parliament on July 3, the head of the National Security Council (NSC), Dr Rowley, revealed for the first time details of the audit done by acting director of the SSA retired Brig Gen Anthony Phillips-Spencer, which painted an alarming state of affairs that went undetected for years under the current PNM administration.

The SSA is authorised to intercept communications, phone calls, WhatsApp, e-mails and other modes after obtaining court orders under the Interception of Communication Act. It was first established in 1995 primarily “to guide the formulation and implementation of national policies on illicit trafficking of dangerous drugs and related criminal activities.” more

Silicon Valley Steps Up Screening on Chinese Employees to Counter Espionage

Leading U.S. technology companies reportedly have increased security screening of employees and job applicants, which experts say is necessary to counter the cyber espionage threat from China.


While the enhanced screening is being applied to employees and applicants of all races, those with family or other ties to China are thought to be particularly vulnerable to pressure from the Beijing government.

But at least one Chinese computer science graduate student at a U.S. university is hoping to make his ties to China an asset. Zheng, who does not want to reveal his first name for fear of retaliation from the Chinese government, says he recently changed his focus to cybersecurity in hopes of improving his job prospects in the United States. more

US Aims To ‘Disrupt’ Chinese Spy Station In Cuba

U.S. officials say they hope to “disrupt” a Chinese intelligence gathering operation allegedly based in Cuba
after a Washington think tank released satellite images it said showed the construction of a spy base capable of surveilling a nearby American naval base.

The Center for Strategic and International Studies on Monday released a report alleging that Cuba in 2021 let China construct spy facilities on “the doorstep of the United States” that would allow Beijing to monitor air and maritime traffic up to 9,000 miles (14,500 kms) away by using radar.

At a press briefing on Tuesday, U.S. State Department principal deputy spokesman Vedant Patel said officials had already “talked about this a little bit more than a year ago” when reports of a Chinese base in Cuba nearly derailed a trip to Beijing by Secretary of State Antony Blinken. more

Tracking Devices Stymie Political Sign Thefts

Political candidates have a new campaign expense: Apple AirTags.


The button-size geotracking device has become a popular tool in the rough-and-tumble world of local elections, where lawn signs often end up stolen, vandalized or run over. Candidates who have grown tired of dirty tricks are hiding AirTags in their signs, leading to digital dragnets when they go missing.

Tracking the device’s pings has led to the doorsteps of alleged sign snatchers and, in some cases, candidates’ opponents. The stings have left snatchers dumbfounded. Some have faced charges of theft, criminal mischief and receiving stolen property.

“I just wanted it to stop,” John Dittmore said of why he got an AirTag after several of his campaign signs vanished over three days in May. more

Sports: Germany Uses 1980's Pop Music to Prevent Rivals Spying

Staff at Germany’s European Championship training base have begun playing loud music on their mobile phones in an apparent attempt to stop spies eavesdropping on their tactical sessions.


Reporters from Bild have chronicled how they were followed by two men while walking near the perimeter of the Adidas site in Herzogenaurach, Bavaria, on Wednesday, one of which was holding a phone blaring out the title song to a children’s television series (sing-a-long) and a song by a 1980s pop duo.

As well as the theme tune to Benjamin Blümchen, the unidentified individuals also played Cheri Cheri Lady by Modern Talking, much to the reporters’ bemusement. (sing-a-long)

The deployment of such extreme measures, apparently in order to drown out any instructions Germany manager Julian Nagelsmann and his coaches may issue to his squad, coincided with the build-up to the country’s crunch Euro 2024 quarter-final against Spain on Friday. more

Monday, July 1, 2024

Security Director Alert: China Enforcing Electronic Device Inspection Law

China is enforcing a new law on Monday that allows national security authorities to inspect electronic devices on suspicion of espionage.

The Ministry of State Security is implementing the legislation that stipulates powers to crack down on spying.

The law states procedures to inspect mobile phones, personal computers and other devices of individuals and organizations. more

Lawsuit Claim: Shopping App Temu - “Dangerous Malware,” Spying on Your Texts

Temu—the Chinese shopping app that has rapidly grown so popular in the US that even Amazon is reportedly trying to copy it—is "dangerous malware" that's secretly monetizing a broad swath of unauthorized user data, Arkansas Attorney General Tim Griffin alleged in a lawsuit filed Tuesday.

Griffin cited research and media reports exposing Temu's allegedly nefarious design, which "purposely" allows Temu to "gain unrestricted access to a user's phone operating system, including, but not limited to, a user's camera, specific location, contacts, text messages, documents, and other applications."

"Temu is designed to make this expansive access undetected, even by sophisticated users," Griffin's complaint said. "Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place." more

TeamViewer Confirms Cyberattack

TeamViewer, the prominent provider of remote access tools, has confirmed a significant cyberattack on its corporate network. 

This attack has been attributed to APT29, a hacking group allegedly linked to Russian intelligence. The breach, discovered on June 26, involved compromised credentials of an employee account, marking another sophisticated cyber-espionage campaign executed by state-sponsored hackers.


According to TeamViewer’s investigation, the breach began with the compromise of credentials from a standard employee account within their corporate IT environment. 

The company has emphasized that the attack was contained within its corporate network, assuring that their internal network and customer systems are separate...Despite these assurances, the company’s investigation is ongoing. more

App Slammed for Spying at Popular Nightclubs Using 'Hidden Cameras'

A new app has sparked extreme blowback after enabling users to use cameras to watch partiers at trendy nightclubs and bars across San Francisco.


2night, the startup behind the app, had hoped that the service would promote nightlife in the area, allowing users to check livestreams of the bars and clubs to determine if they had the right vibe.

But bargoers were quick to lash out after they learned that they were being recorded without their permission, with some going so far as to liken the service to 'Big Brother.' more

THOR: Disables Drone Swarm Attacks


The Department of Defense is exploring options to protect our warfighters further. Enter THOR, stage right. Tactical, High-power, Operational Responder (THOR), is a high-power microwave counter-drone weapon that the Air Force Research Lab has demonstrated for effective use against realistic targets. Watch this video to see how THOR tracks and turns off entire drone swarms. video

Bugging Did Not Pay

A mother who bugged her ex-boyfriend's car and redirected his post in a bid to get more child support is facing jail for stalking. Veronica Jackson, 44, secretly placed a tracker on Kevin McCormack's vehicle and diverted his letters to a drop-off location in a bid to prove he had a job - and could afford £200 monthly maintenance.

Jobless Mr McCormack had claimed he was only able to give £6.25 a week to help with the upkeep of the couple's 12-year-old daughter. Warrington Magistrates Court heard the pair had began a relationship in 2010 and had a daughter together in 2012, but they split up eight years later.

The court was told Mr McCormack received a series of messages from Jackson, from Macclesfield, Cheshire, showing routes he had taken to and from his home. They also included the times of the journeys and messages from Jackson saying: ''I know where you are - I know what you are doing.'' more

30 Spy Movies That Will Make You Want to Be a Secret Agent


Indeed, there are near-endless lists of spy films, but if you’re looking for the top choices, the ones that will captivate your senses, that aren’t just background noise, check out... more

Can You Name the Movie
1. A suave, smooth-talking secret agent and a a bullion dealer.
2. An elegant American interpreter living in Paris, outfitted in Givenchy.
3. In Prague, Czech Republic, a group of IMF agents.
4. A CIA intelligence analyst tracking the location of Osama bin Laden.
5. Extraterrestrials live on Earth, often wearing human shells blend into society.
6. An unnamed man is pulled out of an Italian fishing boat.
7. Joins forces with Russian agent Anya Amasova.
8. Russian operative claims that a mole named Salt plans on killing...
9. Running through the jungles of Uganda, assigned to spy on a terrorist cell.
10. During the fall of the Berlin Wall, sent to Germany to recover microfilm.
11. At the start, the villain escapes in a rocket and cryogenically freezes himself.
12. Captured by the evil TV host Fegan Floop.
13. A hard drive containing details of undercover agents was stolen.
14. Galahad, is in search of a new agent.
15. A girl living in a remote Finnish forest who is raised to be a lethal assassin.
16. They have no recollection of what their superiors said happened in Korea.
17. On vacation in London. Sees a bomb explode outside Buckingham Palace.
18. An advertising executive that is mistaken for government agent.
19. An ordinary man, at a music hall where shots are suddenly fired.
20. A mission to stop a terrorist group called the Apostles.
21. A New York lawyer enlisted by the CIA to defend a Russian spy.
22. He’s brought back to uncover a mole at the British Secret Service.
23. He is investigating the kidnapping of scientists who reappear brainwashed.
24. CIA codebreaker finds his colleagues murdered in the New York office.
25. A surveillance expert who is employed track a young couple.
26. A spy living a double life tracks nuclear rockets from jihadist Salim Abu Aziz.
27. CIA agent posing as an aid worker. Goal: enforce U.S. policies on Vietnam.
28. American daughter of a Nazi, enlisted to spy on escaped war criminals.
29. A World War II veteran charged with a superhuman serum.
30. Connects deaths to a new drug, Dypraxa. Uncovers British Intelligence.

Thursday, June 20, 2024

Security Cam Shoots Paintballs Like in 'Home Alone'

This Security Camera Shoots Paintballs at Intruders.


The track-and-shoot home security cam promises action, but we spot real-world problems after its hugely successful Kickstarter.*

What happens when you combine a paintball gun with a home security cam and smart tracking? All the potential chaos of the Eve PaintCam, an ambitious crowdsourced security camera equipped with smart detection -- and a paintball firing system to mark and scare away intruders.

From creator OZ-IT on Kickstarter and elsewhere, the Eve PaintCam wants people to live out their fantasies of total property control. It even promises face detection to avoid hitting friends (or specifically to hit friends, depending on your mood). more

* Be aware that some Kickstarter projects never materialize, and its use is probably illegal where you live.

Caught on Spycam: Lawmaker Pours Water into Colleague's Bag


A Republican state legislator in Vermont awkwardly apologized on the House floor on Monday after she was caught on hidden camera repeatedly pouring water into a Democratic colleague’s tote bag

State Rep. Mary Morrissey said she was “truly ashamed” of childishly targeting state Rep. Jim Carroll, who dealt with a soaked bag on numerous occasions over the last several months, in what he called “torment.”

“I have given my sincere apology to Jim directly and publicly and will be working towards resolution and restoration through our legislative process,” Morrissey said in front of fellow lawmakers. more

Surveillance News in the Digital World

• AI companies, including Google and OpenAI, are intensifying their screening of new hires due to the threat of Chinese espionage. more

• MICROSOFT ADMITS THAT MAYBE SURVEILING EVERYTHING YOU DO ON YOUR COMPUTER ISN’T A BRILLIANT IDEA... After announcing a new AI feature that records and screenshots everything you do, Microsoft is now delaying its launch after widespread objections. The company broke the news in a blog post detailing its decision not to ship the feature, dubbed Recall, on new computers so that it can continue to "leverage the expertise" of its Windows Insider Program (WIP) beta-testing community. more

• Zoom wants to make sure you’re paying attention.
The company filed a patent application for “scrolling motion detection” in video calls.

• Chinese Spy Tech Driving Junta Internet Crackdown: Justice For Myanmar... China supplied the spy technology and technicians that allowed Myanmar’s junta to intensify its internet surveillance and censorship late last month, Justice for Myanmar (JFM) said on Thursday, warning that China’s increased support for the junta will cost more lives. This support will allow the junta – which has imprisoned more than 25,000 people since the 2021 coup – to identify and jail more people who express dissent. more

• Canada - Public servants uneasy as government 'spy' robot prowls federal offices... A device federal public servants call "the little robot" began appearing in Gatineau office buildings in March. It travels through the workplace to collect data using about 20 sensors and a 360-degree camera, according to Yahya Saad, co-founder of GlobalDWS, which created the robot. "Using AI on the robot, the camera takes the picture, analyzes and counts the number of people and then discards the image," he said. more