Tuesday, November 15, 2016

TSCM School: How Small Can Electronic Surveillance Bugs Be?

...or, why we listen to the wires.

Electronic surveillance devices (audio, video, data) are often referred to by their generic term — bugs.
Amplified Mic (enlarged)
Bugs may be highly specialized, as in a video only spy camera, or may incorporate audio, video and data snooping. An example of this is a device which is secreted in a vehicle, which collects GPS data, audio and video.

Most people, however, think of bugs as audio-only radio transmitters.

Often the simplest bugs are the most effective. These are just microphones attached to a length of wire.

The other end of the wire can be connected to a distant radio transmitter, voice recorder, or simply an amplifier with headphones.

Most people are surprised to learn all homes and offices come prewired, bugging-ready.

Standard telephone cables have unused pairs, and computer Ethernet cables generally only use two of the four pairs they contain. Most older office buildings also have legacy wiring which was never removed.

These "hardwired" bugs are among the most difficult to detect, which is why spies and law enforcement favor them.

Since a microphone is the main element of a hardwired bug,
I thought it might be very useful to show you how small they
can be.

These fingers are holding a real microphone, actual size.

Now you know just how much the other picture was enlarged.

Amazingly small, these microphones are mass produced by the millions.

Fortunately, most wind up in cell phones and hearing aids. However, many are sold on eBay for pennies, and then become bugs.

Not everyone knows how to find these. But, don't worry, we do.

Monday, November 14, 2016

Business Espionage: Agribusiness Now in the Crosshairs

In an industry where information is power, dishonest competitors may steal agrichemical company data and use it to their advantage. While this may sound a little like a James Bond movie plot, industrial espionage is a real event.

Take for example, the case from October 2016, when a Chinese man was sent to prison for 3 years... The crime was part of a years-long conspiracy involving several Chinese citizens aimed at stealing valuable patented corn seeds from Iowa farm fields so they could be smuggled to a Chinese agriculture conglomerate.”...

Worse still, is that this case is not an isolated incident, with Robert Anderson Jr., assistant director of counterintelligence at the F.B.I. explaining that, “Agriculture [industrial espionage] is an emerging trend that we’re seeing.” Adding that, until two years ago, “the majority of the countries and hostile intelligence services within those countries were stealing other stuff.”

Such is the power of a trade secret in modern agribusiness, that attempts to steal it are replacing efforts to learn military secrets.

Possibly, this is part of what geo-political experts call ‘food security’...

When it comes to agribusiness data, industrial espionage should leave you neither shaken nor stirred, but should simply be a case of, ‘We’ve been expecting you Mr. Bond.’ more more

Double Creepy

Oklahoma City Police arrested a man
accused of creeping around an apartment complex and spying on people. The suspect is a funeral director and embalmer.

News 9’s Adrianna Iwasinski got a copy of both the police report and court record from last Friday's arrest, and it states that police found a gun under the man’s driver's seat and they also found a video camera. more

The Sounds in Your Head That Nobody Else Hears May Come From...

...an ultrasound Audio Spotlight invented by Dr. F. Joseph Pompei.

The ultrasound, which contains frequencies far outside our range of hearing, is completely inaudible. But as the ultrasonic beam travels through the air, the inherent properties of the air cause the ultrasound to change shape in a predictable way. This gives rise to frequency components in the audible band, which can be accurately predicted, and therefore precisely controlled. By generating the correct ultrasonic signal, we can create, within the air itself, any sound desired.

Sound is literally made from thin air.

Note that the source of sound is not the physical device you see, but the invisible beam of ultrasound, which can be many meters long. This new sound source, while invisible, is very large compared to the audio wavelengths it's generating. So the resulting audio is now extremely directional, just like a beam of light. more

Sunday, November 13, 2016

WindTalker - A Smartphone Intercept Technique

The way users move fingers across a phone's touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer to accurately guess what the user has typed on his phone or in password input fields.

This type of attack, nicknamed WindTalker, is only possible when the attacker controls a rogue WiFi access point to collect WiFi signal disturbances.

Details about the real-world attack and WindTalker, in general, are available in a research paper titled "When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals."

WindTalker attack has a 68%+ accuracy. more
video

Saturday, November 12, 2016

Robert Vaughn, 'Man from U.N.C.L.E.' Star, Dies at 83

Robert Vaughn, the debonair, Oscar-nominated actor whose many film roles were eclipsed by his hugely popular turn in television’s The Man From U.N.C.L.E., has died. He was 83.

Vaughn died Friday morning after a brief battle with acute leukemia, according to his manager, Matthew Sullivan.



The Man From U.N.C.L.E. was an immediate hit, particularly with young people, when it debuted on NBC 1964. It was part of an avalanche of secret agent shows (I Spy, Mission: Impossible, Secret Agent), spoofs (Get Smart), books (The Spy Who Came in From the Cold) and even songs (Secret Agent Man) inspired by the James Bond films.

Vaughn’s urbane superspy Napoleon Solo teamed with Scottish actor David McCallum’s Illya Kuryakin, a soft-spoken, Russian-born agent.

The pair, who had put aside Cold War differences for a greater good, worked together each week for the mysterious U.N.C.L.E. (United Network Command for Law and Enforcement) in combating the international crime syndicate THRUSH. more

Thursday, November 10, 2016

Business Espionage Problem: Car Spy Photographers Using Drones

...automakers are looking at ways to put a stop to this practice.

Click to enlarge.
One answer may be coming from the German company Deutsche Telekom, which is working with developers on ways to keep drones out of certain areas.

The American company Dedrone also has a DroneTracker system that can locate drones more than half a mile away. We're sure that more creative and interesting means of inhibiting drones are coming down the road as well. more

Spy vs Spy Sweepstakes - Win Original Artwork

Spy vs. Prize Department
MAD’s year-end issue chronicling “The 20 Dumbest People, Events and Things” of 2016 is coming soon. But you don’t have to wait to experience the dumbness of MAD!

Enter now for a chance to win an original piece of Spy Vs Spy artwork by renowned artist Peter Kuper.

This rare piece has never been published, and no, not because one of the editors spilled coffee on it. (Note: The stain has since been removed. Coffee not included in this sweepstakes.)


NO PURCHASE NECESSARY TO ENTER OR TO WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. ODDS OF WINNING WILL DEPEND ON THE TOTAL NUMBER OF ELIGIBLE ENTRIES RECEIVED.The “MAD® Spy vs. Spy Original Art Sweepstakes!” begins on 11/9/16 at 10:00a.m. PT and ends on 11/30/16 at 9:59 a.m. PT. Only open to legal residents in the 50 U.S. and D.C. who are 13 years of age or older. Void in Puerto Rico, the U.S. Virgin Islands, U.S., Military installations in foreign countries, all other U.S. territories and possessions and wherever prohibited or restricted by law. Total Prize ARV is: $100.00. Sponsor: DC Entertainment. This Sweepstakes is in no way sponsored, endorsed or administered by, or associated with Facebook, Twitter or any other social media sites.

Wiretapping & Electronic Surveillance - The IT Spy Guy v. Estranged Wife

PA - An employee of a midstate county faces charges of spying on his estranged wife.

36-year-old David Randall Maurer - who works for the Dauphin County information technology department - is charged with violating the wiretapping and electronic surveillance act.

State Attorney General Bruce Beemer alleges that Maurer installed spyware monitoring software that captured key strokes, screenshots and websites that his estranged wife visited on her laptop.

He allegedly used the information to log into her private email and Facebook accounts. more

Business Espionage: Bugger Caught in the Act

UK - A camera recording with audio was found under a chair during a private meeting of MPs. 

British sportswear company Sports Direct was being paid an unannounced visit by members of the House of Commons’ Business Select Committee. The MPs were there to insure that good working practices were being upheld by the company.

The MPs gave Sports Direct a one-hour warning before arriving, part of a long-running investigation into conditions at the company. During their visit, they were having a private meeting over lunch to discuss their findings. It was then that Labour MP Anna Turley spotted a staff member hiding a camera in the room where they were meeting. 

Turley says a woman came into the room to bring sandwiches to the MPs, then she crouched down to hide a camera under a chair. “I saw her trying to arrange it to get the best angle so that they could video us up at the board table and listen to what we were saying.” more

The device was identified as a small Go-Pro camera, which records excellent audio as well as video. ~Kevin

Kevin's Security Scrapbook Reaches One Million Pageviews

...actually 1,001,644 as of today.
Thank you!
~Kevin

Friday, November 4, 2016

Bugging Devices Found at Iran Nuclear Talks Hotel, Say Swiss Officials

A number of computers at a five-star Geneva hotel that has hosted sensitive talks, including Iranian nuclear negotiations, were found to be infected with malware used for espionage, Swiss prosecutors have revealed...

The long-running nuclear talks were a magnet for the world’s intelligence agencies as they sought to find out more about the Iranian nuclear programme and the negotiating positions of the six nations involved.

When the talks shifted to a luxury hotel in Vienna, the microwave radiation from the surveillance efforts of competing intelligence agencies was so intense that diplomats had to walk some distance from the venue to use their mobile phones.

The US secretary of state, John Kerry, would take walks with his Iranian counterpart, Mohammad Javad Zarif, in what was seen as a publicity stunt, but which was also a practical means of dodging electronic bugs.

When diplomats attending talks in Lausanne wanted to call their capitals, they would stroll around the grounds of the venue, another five-star hotel, rather than call from their rooms. more

Happy 64th Birthday NSA

The National Security Agency celebrates its 64th birthday today.

The agency was established on Nov. 4, 1952, by President Harry Truman in the wake of World War II.

More information about NSA and its history is available online at nsa.gov.

Thursday, November 3, 2016

IoT - Hackers Get A Bright Idea

The so-called Internet of Things, its proponents argue, offers many benefits...

Now here’s the bad news: Putting a bunch of wirelessly connected devices in one area could prove irresistible to hackers. And it could allow them to spread malicious code through the air, like a flu virus on an airplane.

Researchers report in a paper to be made public on Thursday that they have uncovered a flaw in a wireless technology that is often included in smart home devices like lights, switches, locks, thermostats...

The researchers focused on the Philips Hue smart light bulb and found that the wireless flaw could allow hackers to take control of the light bulbs...

That may not sound like a big deal. But imagine thousands or even hundreds of thousands of internet-connected devices in close proximity. Malware created by hackers could be spread like a pathogen among the devices by compromising just one of them. more

UPDATE
This Virus Automatically Kills Smart Light Bulbs
A group of researchers says they found a way to have a self-replicating worm spread through internet-connected lightbulbs, turning them them off, bricking them, or make them all turn on and off multiple times to disrupt the electric grid. “A single infected lamp with a modified firmware which is plugged-in anywhere in the city can start an explosive chain reaction in which each lamp will infect and replace the firmware in all its neighbors within a range of up to a few hundred meters,” the researchers wrote in the paper. more

Tuesday, November 1, 2016

Business Espionage Trick #763 - The CD VD

A cautionary tale...

Telephone pitch
A senior prosecution source in Tel Aviv told the BBC that Ruth Haephrati was the expert at implanting the trojan into the unknowing victims office computer system.

He said she would contact a senior executive proposing a bogus business deal.

She would start with a telephone pitch, before offering to send more detailed information on a CD.

She stressed that the offer was so commercially sensitive that only the executive should open it.

Once the CD was installed, the trojan was let loose, but the company and the executive were none the wiser.

The Haephratis were jailed earlier this year.

But the techniques the Haephratis used are being adapted by others. more