Wednesday, February 19, 2025

Spy Cam News: 2024 Singapore Slings

• 519 voyeurism cases were reported last year — a 9% rise. 

• Over 30% of the incidents occurred in victims' own homes.

• Physical crime cases in Singapore remained stable in 2024.

Most cases at residential premises (124 cases or 76.5%) were committed by perpetrators known to the victims (such as boyfriends/ex-boyfriends, household members or fellow tenants). Cases at shopping complexes and on the public transport network typically involved perpetrators not known to the victims.

At public transport nodes, the SPF has started initiatives to display advisory messages on voyeurism prominently on floor decals at selected MRT stations. Anti-voyeurism messages are also broadcast at all MRT stations during peak hours. The SPF has also collaborated with the Restroom Association (Singapore) to introduce security design guidelines, enhancing safety in public toilets. more

Mom Hears a Stranger Talking to Child Through WiFi Baby Monitor

The monitor's camera was positioned directly above the crib. “Of course, he was crying a little bit, so I opened the app and turned on the audio just to keep an eye on him,” says the OP (original poster on reddit.com). “As soon as I turned on the audio, I hear a woman’s voice go, ‘Hello?’”

The OP asked their husband if there was anything in the room that talks or if the camera made noise when turning the audio on. The answers were no and no. “I go back upstairs, and as I’m opening the door to my son’s room I hear the same woman talking to my son through the camera,” the OP writes. “She said, ‘Hi baby! It’s OK!’ 

“Consumer Reports found that most of these models have pretty lax security and privacy and didn't earn a recommendation in our ratings,” explains Allen St. John, the content manager for baby monitors of Consumer Reports. more

A Spymaster Sheikh Controls a $1.5 Trillion Fortune. He Wants to Use It to Dominate AI

His real name is Sheikh Tahnoun bin Zayed al Nahyan. A bearded, wiry figure who’s almost never seen without dark sunglasses.

Tahnoun is the United Arab Emirates’ national security adviser—the intelligence chief to one of the world’s wealthiest and most surveillance-happy small nations. He’s also the younger brother of the country’s hereditary, autocratic president, Mohamed bin Zayed al Nahyan. But perhaps most important, and most bizarrely for a spymaster, Tahnoun wields official control over much of Abu Dhabi’s vast sovereign wealth. Bloomberg News reported last year that he directly oversees a $1.5 trillion empire—more cash than just about anyone on the planet...

But in recent years, a new quest has taken up much of Sheikh Tahnoun’s attention. His onetime chess and technology obsession has morphed into something far bigger: a hundred-billion-dollar campaign to turn Abu Dhabi into an AI superpower. And the teammate he’s set out to buy this time is the United States tech industry itself. more

An Extra Defense Against Keyless Car Theft

The rising amount of technology in our vehicles makes them increasingly vulnerable to hacking or theft. 

Battery Sleuth bypasses both the wireless communication that key fobs depend on and the standardized onboard communication network in today’s vehicles. Instead, it authenticates drivers by measuring voltage fluctuations in a vehicle’s electrical system. Drivers interact with it through a keypad device plugged into the auxiliary power outlet. Learn more in this video.


“The idea of measuring fluctuations in a car’s electrical system seems simple, but designing one device that can do it accurately on thousands of different vehicle models in varying environmental conditions gets quite complicated,” said Liang He , assistant professor of computer science and engineering at the University of Colorado, Denver and a researcher on the project. “We’re working to design a system that’s smart enough to measure the parameters of the vehicle it’s installed on and then customize itself to work effectively on that vehicle.” more

Student Arrested for Placing Spy Cameras in Bathrooms

Police say a Temple University student was arrested and charged after hidden cameras were found inside the bathrooms of his off-campus residence.

Authorities say 21-year-old Michael Nguyen planted three cameras disguised as pens inside the bathrooms of a residence he shared with his now former Delta Chi Psi fraternity brothers on 17th Street and Montgomery Avenue...

They say he was expelled from the fraternity “without hesitation.” more 

Spy History: 1902 Corporate Espionage on the High Seas

Your Editor (not me) chanced upon the following in the library of the National Maritime Museum at Greenwich last winter and it is reprinted here by kind permission of Stephen Rabson, Group Information Manager of P&O.

The document is in the form of a quasi-official report, written by one of P&O's traveling inspectors on two voyages in 1902, one from Southampton to New York, the other from Vancouver to Yokohama.

The writer (whose signature is, alas, indecipherable) was clearly more than a passenger, he was a benevolent spy, assessing conditions aboard the competition...

"I have the honor to report my arrival here yesterday. The following details of the steamers in which I have traveled may interest you..." more

This business spy tactic has been around forever. These days corporate espionage is enhanced with electronics (audio, video, and data). This is why businesses have added Technical Surveillance Countermeasures to their security precautions. If you have not, it is highly recommended you do so. Contact a professional TSCM information security consultant to begin protecting your company.

Saturday, January 25, 2025

Better Idea: Prevent the Boardroom Leaks - Conduct TSCM Inspections

HP Studied Spying on Newsrooms: NY Times

Hewlett-Packard conducted feasibility studies on placing spies in news bureaus of two publications as part of an investigation into leaks from its board, The New York Times reported on Wednesday. Hewlett-Packard could not immediately be reached for comment.

The Times cited an individual briefed on the company's review of the operation in its report. It is not clear whether the plan described in the documents, which were read to a reporter, was ever acted upon, The Times said.

The newspaper said the feasibility studies, referred to in a February 2 draft report for a briefing of senior management, were said to have included the possibility of placing investigators acting as clerical employees or cleaning crews in the San Francisco offices of technology news Web site CNET and The Wall Street Journal.

HP is under investigation by U.S. federal prosecutors and the California attorney general over the company's potentially illegal tactics in obtaining phone records in a bid to end boardroom leaks to the media. more 

FutureWatch: "Proactive Eavesdropping"

Proactive eavesdropping in wireless communication systems is an emerging area of research that focuses on the interception of communications while minimizing the risk of detection. 

This involves the use of advanced techniques such as jamming and intelligent reflecting surfaces to enhance the eavesdropping capabilities of legitimate monitors. 

Recent studies have explored various scenarios where suspicious communications occur, and how legitimate monitors can optimize their strategies to maximize the success of eavesdropping while adhering to certain constraints. more

Note from website: This Nature Research Intelligence Topic summary is one of 30,000 created with generative AI and the cited references. We take care to ground generative text with facts, and have systems in place to gain human feedback on the overall quality of the process. We however cannot guarantee the accuracy of every summary and welcome feedback.

Seminar in Information Security & Cryptography

Seminar in Information Security & Cryptography
Zurich Switzerland, June 11−13, 2025
Lecturers: Prof. David Basin and Prof. Ueli Maurer, ETH Zurich

We are pleased to announce our seminar in Information Security and Cryptography. A full description of the seminar, including all topics covered, is available at
https://www.infsec.ch/#seminar. Early registration is until February 28th.

This seminar provides an in-depth coverage of Information Security and Cryptography. Concepts are explained in a way understandable to a wide audience, as well as mathematical, algorithmic, protocol-specific, and system-oriented aspects. The topics covered include cryptography and its foundations, system and network security, PKIs and key management, authentication and access control, privacy and data protection, and advanced topics in cryptography including blockchains and cryptocurrencies.

The seminar takes place in Zurich, Switzerland. The lectures and all course material are in English. Participants will receive certification for their attendance.

Spy Camp 2025

Spy Camp 2025
Week 1: July 14 – July 18 | Week 2: July 21 – July 25
9:00 AM – 3:00 PM Daily | Ages: 9 – 12
Price per child: $625 (Non-member) | $545 (Spy Museum Members) 

This isn’t your ordinary summer camp — this is Spy Camp!
Somewhere deep inside the Museum, an elite group of recruits is lurking in the shadows preparing to take on top secret missions.

Aspiring KidSpy® recruits will hone their tradecraft, learn from real spies, and hit the streets of DC to run training missions. Develop a disguise for cover, make and break codes, discover escape and evasion techniques, create and use spy gadgets, and uncover the science behind spying – all of this and more awaits young recruits! more

Friday, January 24, 2025

Point One for the Chinese Cyber Spies

An investigation by a US federal advisory board into a sweeping digital espionage campaign, allegedly by Chinese cyber spies, has been shelved before it really got underway.

Members of the Cyber Safety Review Board are getting the boot as part of an early move by the Trump administration to dismiss participants in Department of Homeland Security advisory committees, according to multiple news reports and a person familiar with the matter.

A spokesperson for the Department of Homeland Security didn’t immediately respond to a request for comment. more

Thursday, January 23, 2025

Stop Working for Russia, Britain Tells its Private Spies

The British government has warned the country’s burgeoning private intelligence and security industry to stop doing work for hostile states like Russia, China and Iran.

In new guidance for security professionals published this week, the U.K. Home Office said such work risks breaking tough new national security laws — and could even see pros sent to prison for up to 14 years...

It suggests companies should “strongly consider” turning down work if a potential client works for a foreign state’s public sector, fails to provide sufficient information about their identity, or asks them to gather sensitive information. more

Sunday, January 12, 2025

Russian Spy Hoarded Surveillance Gadgets - Boasted: Like James Bond Q

A Russian spy was living in a "typical seaside hotel" on the English coast crammed full of electronic surveillance equipment, a court has heard.

Orlin Roussev boasted to his controller that he was becoming like the James Bond character "Q" as he prepared his spying "toys" for kidnap and surveillance operations across Europe...

The Old Bailey was told a "vast" amount of technical equipment for "intrusive surveillance" was found at Roussev's address in Great Yarmouth, Norfolk, which he described in messages as his "Indiana Jones warehouse"... a "significant amount of IT and surveillance equipment". It was stacked up in two storage rooms and an office used by Roussev, the court was told. more

Recent Spycam News

• Paedo Scots actor who set up hidden cameras to film children undressing at theatre jailed more

• Des Moines photographer gets 30-year sentence for secret videos of underage girls changing more

• West Chester man with history of secretly recording women, teens going back to jail more

• Attorney who hid camera in South Carolina condo sued by alleged victim more

• Celebrity osteopath caught spying on changing university students 'agrees to cooperate with police more

• Palm Beach County Man Arrested After Hidden Cam Found In Room He Rented Out more


Senate Reintroduce Bill to Flag Eavesdropping Appliances

Senate Commerce Committee Chairman Ted Cruz, R-Texas, Ranking Member Maria Cantwell, D-Wash., along with Sen. John Curtis, R-Utah, reintroduced legislation this week that aims to protect Americans from their snooping appliances.

The Informing Consumers About Smart Devices Act would require the Federal Trade Commission to create disclosure guidelines for products that have audio or visual recording components that are not obvious – such as refrigerators, washers, dryers, and dishwashers. more

New Hidden Camera Lawsuit Filed Against Royal Caribbean

A group of 12 cruise ship guests, all US citizens, have filed a new lawsuit against Royal Caribbean over a hidden camera case
that saw a crew member jailed for 30 years. Aronfeld Trial Lawyers filed the suit in Miami on behalf of the 12 plaintiffs.

Filipino Arvin Joseph Mirasol, a former stateroom attendant on Symphony of the Seas, was convicted of placing hidden cameras in bathrooms and recording footage earlier this year. He pled guilty to video voyeurism and child abuse material charges.

“The fact that many victims we represent still do not know if and how their images have been used or circulated is incredibly disturbing. Some of the plaintiffs are children – and once an image is on the internet it is there forever,” said attorney Spencer Aronfeld who is handling the new complaint. more

Split Among U.S. Spy Agencies Over 'Havana syndrome'

The White House said the new findings reflect “a shift in key judgements,” calling for more research into injuries to American diplomats and intelligence officers stationed overseas.

A split has emerged among U.S. intelligence agencies over whether a foreign adversary may have been responsible for unexplained “Havana syndrome” injuries to American diplomats and intelligence officers stationed overseas.

A U.S. intelligence assessment released Friday revealed that two of seven spy agencies now say a foreign actor may have developed or deployed a weapon that caused the mysterious health incidents. Officials declined to reveal which intelligence services had shifted their view of the injuries, which first emerged in Havana, Cuba.

Five of seven intelligence agencies or departments echoed findings from 2023 and concluded that it was “very unlikely” that a foreign actor caused the medical symptoms that include vertigo, hearing loss, intense headaches, pain in the ears and blurred vision. Their conclusions were based in part on “sensitive intelligence reporting continuing to point away from foreign involvement,” according to the assessment. more

9th Circ. Upholds Ore. Ban On Secret Audio Recordings


A split en banc Ninth Circuit panel on Tuesday upheld as constitutional an Oregon law prohibiting secret audio recordings of people's conversations, ruling in a published opinion that the statute was narrowly tailored to Oregon's significant interest in ensuring its residents know when their conversations are recorded, even in public. more

Someone Likely Used a Sophisticated Phone-Spying Device at the 2024 DNC

The Electronic Frontier Foundation has come to the conclusion that someone likely deployed a mobile phone surveillance system during the Democratic National Convention last summer, according to a new report from Wired. 

Evidence for that assertion comes from Cooper Quintin, a senior technologist at EFF, who has spent time investigating whether police technologies were deployed during the event from the event. Wired worked together with the EFF to conduct an analysis of wireless signal data. What they found was evidence that someone may have used a cell-site simulator to spy on devices. more

Swiss National Accused of Spying Died by Suicide in Iranian Prison

A Swiss national who was arrested and accused of spying in Iran died by suicide in prison on Thursday (Friday AEST), according to Mizan Online, a news agency affiliated with Iran's judiciary.

"All evidence and documents from the place where this person was being held have been reviewed, and according to the documents, it is clear that he committed suicide," the chief justice of Iran's Semnan province said, as cited by Mizan Online.

This Swiss citizen's case, whose identity has not been disclosed, "was being reviewed and processed" after he was arrested for espionage, according to Mizan Online. more

The National Museum of Eavesdropping

The national museum of eavesdropping "House with Leaves" in Tirana, Albania has published statistics on visitation during 2024, from which it appears that there was an increase of 58 percent of visitors, compared to 2023.


"During the year 2024, the Museum of Eavesdropping was visited by 77 people. The increase in visitation has consequently also brought an increase in income...

The National Wiretapping Museum was opened on May 23, 2017. It is one of the most special in Albania, which tries to tell young people and foreigners one of the darkest periods of the country's history, being the Central Headquarters of Service Wiretapping Secret, from 1944 – 1991. more

But not all eavesdropping is what it appears to be... MU researcher eavesdrops on bugs more

Monday, December 30, 2024

Claim Your Free 2025 Spy Wall Calendar

Key Features of the Shinobi Enterprises 2025 Wall Calendar:
• Facts You Can Use
• Each month features an overview of a recent case of espionage, economic espionage, covert action, or illegal technology export.
• Espionage Tradecraft. Espionage tradecraft is highlighted in each case.
Perfect for your office or home. Just download and print.


Check Before Opening Encrypted Microsoft Word Documents Emailed to You

Threat intelligence analysts have now reported a surge in the activity of the Paper Werewolf cluster, also known as GOFFEE, which uses infected Microsoft Windows Word documents to launch mostly espionage-driven, credential-compromising attacks.

Like so many other attack campaigns, Paper Werewolf uses phishing emails and brand impersonation to distribute its malicious payload. These messages contain an encrypted Microsoft Word document that prompts the recipient to enable macros in order to read it. If they do this, then the content of the document is decrypted, and the malicious program is installed on their device. The threat intelligence analysts said that, in some instances, they observed the use of PowerRAT, a remote access trojan, enabling the attackers to execute commands and carry out reconnaissance. more

Russian Tanker Suspected of Baltic Sea Sabotage was ‘Loaded with Spy Equipment’

A Russia-linked tanker suspected of cutting Baltic Sea cables has been tugged to port amid reports it was loaded with “spy equipment”.


The vessel is said to have been kitted out with special transmitting and receiving devices that monitor all naval activity, according to shipping journal Lloyd’s List citing a source with direct involvement in the ship. ...The source, who spoke on the condition of anonymity, said the vessel was loaded with “huge portable suitcases” and “many laptops”... 

Those on board the ship would have been aware of the spying activities but would have been “threatened with their life, so everybody kept quiet”, the source told the journal. more

This Week in Spy News

Officials Deny Approving Sale of Israeli Spyware Firm to US Investors

Officials in the United States and Israel have denied reports their countries had signed off on the sale of Israeli spyware maker Paragon to Florida-based AE Industrial Partners... 

"The U.S. government never 'approved' this sale. This is a private transaction," the official said. "There wasn't some sort of green light given for this sale." The Israeli military also denied the reports... more

How Pigeons, Cats, Whales, Robotic Catfish Acted as Spies

The death of a spy is rarely newsworthy, due to the secrecy surrounding it.
But when a white beluga whale suspected of spying for Moscow was found dead in Norwegian waters in September, the animal soon became a minor celebrity....

The US ran similar experiments with animals, some dating back to the 1960s. One of the CIA’s more unusual attempts to use animals as spies was Operation Acoustic Kitty...

The idea was to implant a microphone and antenna into the cat and use it to eavesdrop on potentially interesting conversations. The test of the “prototype” went horribly wrong... more

Smart Home Cameras Spying

According to a study conducted by Surfshark, outdoor security camera apps are some of the top offenders when it comes to collecting user data.
These apps gather 12 data points on average, including sensitive details like email addresses, phone numbers, payment information and precise location. That’s 50% more than what other smart home devices typically collect.
Which apps collect the most data?
Among the apps that collect the most data, Deep Sentinel and Lorex stand out for outdoor security cameras, each collecting 18 out of a possible 32 data points. Nest Labs, which leads the pack for indoor cameras, collects 17 data points, with Ring and Arlo each gathering 15. more

The Spy Cam Lunch Box

From our, "You can't make this shxt up," file...

Wednesday, December 11, 2024

Security Director Alert: Latest Electronic Surveillance of Corporate Executives

What is going on at Boohoo?
• Espionage claims arise as boardroom battle continues.
• Cautionary tale.

The past few months have been turbulent for Boohoo, to say the least. Yet, last week, things seemed to come to a head when claims of espionage arose at the fast fashion giant.

According to a report by The Times, three current and former executives of Boohoo are believed to be the victims of stalking and surveillance. The alleged espionage is said to have been committed against Boohoo’s co-founder and executive chair Mahmud Kamani, chief executive Dan Finley and former CEO, John Lyttle.

The allegations were brought to light after the company informed the Information Commissioner’s Office (IOC) of a related incident taking place outside of its Manchester headquarters. The report was confirmed by the IOC in a statement to the press, which read: “We can confirm that Boohoo Group has made us aware of concerns regarding the discovery of surveillance equipment outside its head office.”

In a more recent update, the Times has now reported that police in Manchester and Kent are investigating the claims, with Greater Manchester Police stating to the media outlet that it was looking into allegations “involving serious distress”. No arrests have been made, so far. more

Spybuster Tip # 675
Prior to any attack (physical, information theft) some form of surveillance tradecraft (audio, video, data or visual surveillance) will be used. 
If you are a business executive don't ignore this. 
More tips here.

TSCM Tech: Another Step Closer to the Holy Grail - Visualizing RF

Holo-Scan: 3D Scanner with Augmented Reality (AR) Headset
The Holo-Scan is a 3D electromagnetic field mapping system in augmented reality (AR) compatible with various laboratory equipment such as spectrum analyzers, vector network analyzers (VNA) or specific probes (Narda, Wavecontrol…). Unlimited frequency band depending on the instruments used.  The data is then exported in .lxd format and directly analyzed in the online viewer. more
Looking forward to the day this can be direct coupled to an SDR and my Vision Pro. ~Kevin

Who Needs TSCM... China’s top court vows to combat eavesdropping, illegal recordings...

The Supreme People's Court (SPC) on Wednesday released several cases regarding the prosecution of crimes related to the illegal production, sale, and use of eavesdropping and surreptitious recording equipment, showing a clear stance on cracking down on the underground industrial chain behind such activities.
The SPC revealed that some offenders installed eavesdropping and recording devices in hotels, guesthouses, and other locations to spy on unknowing guests and patrons. In some cases, they provided internet links for others to view these recordings in real time or produced images, audio, and videos for sale and distribution, according to Xinhua News Agency.

Others used such devices for illegal activities such as unauthorized investigations, blackmail, and cheating in gambling, seriously infringing upon people's information security and privacy. Additionally, some offenders had illegally manufactured and sold these devices, fueling their proliferation in society and exacerbating the issue of illegal recording, the SPC said. more
Shocking! One wonders if this will stop the exports, and will there be a run on eBay and amazon spy merch.

Research Finds that Cellular Walkie Talkies Put Americans at Risk of Chinese Spying

Haloid Solutions, a leading provider of wireless communications equipment, is warning all business and government agencies about foreign espionage and business disruption risks from China-manufactured cellular two-way radios.
These devices were sold in the United States from "pop up companies" that claimed the devices were private.

For the past year, we've researched and investigated the radio over cellular space, also known as Push-to-Talk Over Cellular, or PoC. We've encountered dozens of "pop up" U.S. companies selling China engineered, manufactured, and hosted devices for extremely low prices.

The devices are advertised as encrypted and marketed and sold to businesses and government agencies. 

We estimate millions of these devices are currently in operation. From our research, we've found that many of these companies' claims are misleading or false. For example, one Chinese manufacturer white labels its products under numerous U.S. names, and claims that the servers hosting its radios are on Amazon servers in the U.S. In reality, they are hosted by Alibaba, the Chinese tech conglomerate and are vulnerable to Chinese spying by sending back user data to China. more

Google Warns Millions Of Android Users—These Apps Are Spying On You

Google is narrowing the gap to iPhone on the security and privacy front with Android 15.
A raft of welcome changes will better protect users, their devices and their data, including live threat detection to quickly flag malware and permission abuse, cellular network defense, and tighter controls of what apps are doing behind the scenes.

When we talk about permission abuse, we clearly mean the grey area between apps behaving well and outright spyware—of which there’s still plenty on Android. While Apple led the charge to restrict location tracking and access to sensitive phone functions like messaging, cameras and contacts, Google has followed. more

10 High-Octane Spy Movies That Can Compete With James Bond

Skip the Hallmark Channel this season with this hit list...

10
The Bourne Identity (2002)
The James Bond Franchise's American Twin

9 
Tinker Tailor Soldier Spy (2011)
A Timeless Film With Quieter Thrills

Kingsman: The Secret Service (2014)
Everything That's Great About James Bond Cranked Up To 11

Mission: Impossible - Ghost Protocol (2011)
Ethan Hunt Is A Great James Bond Rival

Atomic Blonde (2017)
A Unique Spy Movie That Stands On Its Own Against Hits Like James Bond

Sicario (2015)
Trades The Glamor Of James Bond For A Grim Spy Story

Tenet (2020)
Bond For Physics Enthusiasts

Argo (2012)

Bridge of Spies (2015)

The Hunt for Red October (1990)

Then,  for stress relief...
Top Secret! (1984)


Tuesday, December 3, 2024

Cautionary Tale for Traveling Executives - A Case of Spy Tradecraft...

A Bulgarian espionage ring working on behalf of Russia in the UK used video-recording spyglasses and honey traps to gather information on journalists and dissidents...

...five Bulgarian nationals who are accused of spying in Britain as part of a ring co-ordinated by Jan Marsalek, the former chief operating officer of Wirecard. 

London’s Old Bailey heard the group targeted journalists Christo Grozev and Roman Dobrokhotov, as well as Kazakh dissident Bergey Ryskaliyev, tracking them variously on flights and across European cities during 2021 and 2022. 

One member of the group, Katrin Ivanova, 33, used specially-designed glasses to record images and videos to watch Grozev on a flight from Vienna to Montenegro in June 2022, prosecutor Alison Morgan KC said. The group had accessed an airline industry database called “Amadeus” through another Bulgarian contact to ascertain the flight details and seat numbers of their targets, the court heard. 

Ivanova also sat nearby Dobrokhotov on a flight in November 2021 and memorised his phone pin code, reporting it back to her handlers, Morgan added. “That was a correct capture and showed the tradecraft of Miss Ivanova,” Morgan told the court. 

The group also discussed bribing hotel staff, employing pickpockets and infiltrating a target’s home by hiring Bulgarian and Romanian cleaning teams, the court heard. more
Court artist sketch of Bulgarian national Katrin Ivanova (Elizabeth Cook/PA)
Bulgarian national Katrin Ivanova (Elizabeth Cook/PA)


and... Russian agent discussed deploying a “true sexy bitch” in a “honeytrap” spy plot against an award-winning journalist, a court has heard...Prosecutor Alison Morgan KC told jurors that, as well as trying to “befriend” Mr Gozev, Gaberova had been engaged in capturing surveillance images of him at the conference...

She said: “These images were extremely important as they showed Christo Grozev together with others of interest to Russia, Eliot Higgins. 

“Roussev would later seek to use face recognition software to check that the image did show Christo Grozev with Higgins together.”...

She showed off her “tradecraft” by relaying images, using covert recording equipment and capturing Mr Dobrokhotov’s iPhone PIN number, Mr Morgan said. more

TSCM Tech - Coating Hides Temp Changes from IR Cameras

An ultrathin coating developed by University of Wisconsin–Madison engineers upends a ubiquitous physics phenomenon of materials related to thermal radiation: The hotter an object gets, the brighter it glows.

The new coating — engineered from samarium nickel oxide, a unique tunable material — employs a bit of temperature trickery.

“This is the first time temperature and thermal light emission have been decoupled in a solid object. We built a coating that ‘breaks’ the relationship between temperature and thermal radiation in a very particular way,” says Mikhail Kats, a UW–Madison professor of electrical and computer engineering. more

Using a Device to Track medical data?

Are you using a device to track medical data? Here’s who else might be watching...

Wearable technology—smartwatches, smart rings, fitness trackers and the like—monitors body-centric data such as your heart rate, steps taken and calories burned, and may record where you go along the way. Like Santa Claus, it knows when you are sleeping (and how well), it knows when you're awake, it knows when you've been idle or exercising, and it keeps track of all of it...

Health information has become a prime target for hackers seeking to extort health care agencies and individuals after accessing sensitive patient data...

The report "From Skin to Screen: Bodily Integrity in the Digital Age" recommends that existing data protection laws be clarified to encompass all forms of bodily data. It also calls for expanding national health privacy laws to cover health-related information collected from health apps and fitness trackers and making it easier for users to opt out of body-centric data collections. more

3 Charged in Theft of Shoes from Train

Three men have been charged with breaking into a BNSF train and stealing more than $300,000 in Nike merchandise while the train was parked in the Mojave Desert and then transporting the stolen goods to Anaheim....

In an effort to prevent theft, Nike placed a GPS tracker in the shipment of Air Jordan 11 Retro shoes...

Investigators with the California Highway Patrol tracked the GPS tracker to a U-Haul truck in an Anaheim parking lot and found 1,278 Air Jordan 11 Retro shoes valued at $311,832 inside the rental truck. more

‘Prison yard’ Surveillance | Lawsuit Alleges Apple Spies on Employee's iPhones

An Apple worker has filed a lawsuit against the company, alleging it spies on its employee’s personal iCloud accounts and iPhones.


As reported by Semafor, the lawsuit filed Sunday claims Apple says it can “engage in physical, video and electronic surveillance” of employees, including accessing data on personal iPhones it “actively encourages” staff to work.

Apple refutes the claims of the lawsuit, which alleges several other employment law violations including free speech suppression and illegal clawback policies. more

New Eavesdropping Technology Reveals Vulnerabilities in Underwater Communications

Researchers from Princeton and MIT have uncovered a method for intercepting underwater communications...

...challenging long-standing assumptions about the security of sonar transmissions. By using radar to detect the tiny surface vibrations caused by underwater acoustic signals, the team has demonstrated how these signals can be decoded from the air, offering significant security implications for sensitive data transmitted underwater.

The team detailed their findings in a paper presented at the ACM MobiCom conference on November 20. According to TechXplore, they explained how their device can pick up vibrations on the water’s surface, allowing it to eavesdrop on underwater messages. This technique could also potentially identify the location of the transmitting underwater device, making it a powerful tool for intelligence gathering or adversarial actions. more

Canadian Coach Implicated in Drone-Spying Scandal Resigns Abruptly

John Herdman, the former Canada coach who was implicated in the drone-spying scandal, has abruptly resigned as manager of MLS side Toronto FC.

His reputation has been tarnished somewhat after he was caught up in the investigation into a Canada Soccer staffer spying on their New Zealand opponents with a drone at the 2024 Paris Olympics. The scandal saw head coach Bev Priestman, assistant coach Jasmine Mander and analyst Joey Lombardi all handed a one-year FIFA ban.Emma Hayes fulfills national anthem promise before USWNT vs. England friendly.

Herman denied any wrongdoing in the scandal given his previous role as head coach. He declined to publicly address allegations of a link to a culture of spying within Canada Soccer but maintained his record was clean at the Olympics and World Cups. more

Thursday, November 14, 2024

China’s Anti-Espionage Law Could Impact Pharmaceutical Supply Chains

The pharmaceutical industry is facing another challenge as China seems to strengthen its Anti-Espionage Law, which introduces uncertainties that could disrupt the global supply of essential drug ingredients.
With drug shortages already a significant concern, this development adds further pressure on the industry to navigate a rapidly changing landscape and secure its supply chains...

The last version of China’s Anti-Espionage Law, which came into force on 1st July 2023, significantly expands the definition of espionage to include the handling or sharing of information that could be seen as a threat to national security. This broad definition puts foreign life sciences companies operating in China at risk, as routine business activities could now be interpreted as a threat to national security. This law also grants extensive powers to the Chinese authorities to implement national security measures, including arrests.

One immediate consequence of this law is that three German states recently suspended the travel of their inspectors responsible for monitoring pharmaceutical facilities in China, due to the risk of the inspectors being arrested, prompting the Chinese Ministry of Foreign Affairs to respond on 19th August 2024 that "China is a country ruled by law". more

AI CCTV - Creating a Surveillance Society

Premiering in New York City in June 2002, Steven Spielberg’s critically acclaimed film Minority Report, starring Tom Cruise, depicted a society where police use psychic mutants to predict and prevent murderers from committing their crimes. Now, South Korean company Electronics and Telecommunications Research Institute (ETRI) is using AI to make it a reality. 

Aptly named ‘Dejaview,’ ETRI’s high-tech platform blends AI with real-time CCTV to predict crimes before they transpire. But whereas the Pre-Crime department Tom Cruise heads in Minority Report focused on criminal intention, Dejaview is instead concerned with probability. 

ETRI says the platform can discern patterns and anomalies in real-time scenarios, allowing it to predict incidents from petty offences to drug trafficking with a sci-fi-esque 82% accuracy rate. more

Fry Spy: What's Done in an Air Fryer Doesn't Stay in an Air Fryer

UK consumer champion Which? wants you to know that your air fryer might be spying on you and sharing your data with third parties for marketing purposes.


The perhaps not-so-surprising findings from the buyer's friend are that smart devices in general are engaged in surveillance of their owners, and that data collection often goes "well beyond" what is necessary for the functioning of the product...

Testing out products across four categories, the outfit discovered that all three air fryers it looked at wanted permission to record audio on the user's phone, for no specified reason.

One wanted to know gender and date of birth when setting up an owner account, while the Xiaomi app linked to its air fryer was found to be connected with trackers from Facebook, Pangle (the ad network of TikTok for Business), and Chinese tech giant Tencent.

Air fryers from brands Aigostar and Xiaomi both sent the owner's personal data to servers in China – although this was flagged in the privacy notice, for what it's worth. more

Giambattista della Porta (1535 – 1615): The Egg-cryption Man

Della Porta invented a method which allowed him to write secret messages on the inside of eggs.
 

Some of his friends were imprisoned by the Inquisition. At the gate of the prison, everything was checked except for eggs. Della Porta wrote messages on the eggshell using a mixture made of plant pigments and alum. The ink penetrated the eggshell which is semi-porous. When the eggshell was dry, he boiled the egg in hot water and the ink on the outside of the egg was washed away. 

When the recipient in prison peeled off the shell, the message was revealed once again on the egg white. - Philalethe Reveal'd Vol. 2 B/W

Man Destroys Dental Clinic Claimed Dentist Implanted Eavesdropping Chip

... in wife's tooth.
A woman and her husband have justified their decision to damage a Brazilian dental clinic after they strangely claimed the dentist secretly placed a chip in her mouth three years ago to eavesdrop on their family's conversations.

The shocking incident was recorded from the Belo Horizonte office when 27-year-old Kenia Aparecida and her 31-year-old partner came and asked to see the dentist on Wednesday, the Telegraph reports.

"They pulled out two of my teeth and without my authorization, they put a chip in my mouth and listened to my conversations. But my husband saw that it was in (the mouth) and the dentist does not want to take it out". more with video

Runaway 'Spy Whale' Fled Russian Military Training

The mystery as to why a beluga whale appeared off the coast of Norway wearing a harness may finally have been solved.


The tame white whale, which locals named Hvaldimir, made headlines five years ago amidst widespread speculation that it was a Russian spy.

Now an expert in the species says she believes the whale did indeed belong to the military and escaped from a naval base in the Arctic Circle.

But Dr Olga Shpak does not believe it was a spy. She believes the beluga was being trained to guard the base and fled because it was a "hooligan". more

The Last Thing I Wanted to See...

In the parking lot,
after completing a TSCM bug sweep...



Monday, November 4, 2024

Chinese Spooks Hacking US Mobile Users in Real Time

Millions of US mobile users could be vulnerable to Chinese government spooks who are apparently desperate to know when they are picking up their snowflakes from school and where they order their pizza...

The US intelligence community briefed six current or former senior US officials about the attack. The Chinese hackers believed to be linked to Beijing's Ministry of State Security, have infiltrated the private wiretapping and surveillance system that American telecom companies built exclusively for US federal law enforcement agencies.

The US government believes the hackers likely still have access to the system. Since the breach was first detected in August, the US government and the telecom companies involved have said very little publicly, leaving the public to rely on details trickling out through leaks.

The lawful-access system breached by the Salt Typhoon hackers was established by telecom carriers after the terrorist attacks of September 11, 2001. It allows federal law enforcement officials to execute legal warrants for records of Americans' phone activity or to wiretap them in real-time, depending on the warrant.

Many of these cases are authorised under the Foreign Intelligence Surveillance Act (FISA), which investigates foreign spying involving contact with US citizens. The system is also used for legal wiretaps related to domestic crimes. more