Monday, May 18, 2020

Sir Frederick Barclay's Nephew 'Caught with Bugging Device' at Ritz Hotel

The footage is at the centre of a bitter legal row between the families of the billionaire Barclay twins.

Sir Frederick, 85, and his daughter Amanda are suing three of Sir David Barclay's sons for invasion of privacy.

They claim the surveillance gave the men commercial advantage and they sold the Ritz for half its market value.

The Barclay brothers' businesses include the Telegraph Media Group, the online retailer Very Group, the delivery business Yodel, and - at the time of the bugging - the Ritz hotel in London.

Sir Frederick, the elder twin by 10 minutes, and his daughter Amanda are suing Sir David Barclay's sons - Alistair, Aidan and Howard, Aidan's son Andrew, and Philip Peters, a board director of the Barclay group for invasion of privacy, breach of confidence and data protection laws.

The claim stems from a falling out between the children of the famously private twins...


The CCTV footage allegedly shows Alistair Barclay handling a bugging device at the Ritz hotel on 13 January this year. The recording shows Mr Barclay inserting a plug adaptor, which is claimed to contain a listening device, into a socket.

In court documents lodged by Sir Frederick and Amanda Barclay, it is claimed the bug - which was placed in the hotel's conservatory where Sir Frederick liked to conduct business meetings and smoke cigars - captured more than 1,000 separate conversations amounting to some 94 hours of recordings.

The pair claim the recordings amount to "commercial espionage on a vast scale"....
Voice Activated Wireless GSM Spy Bug SIM Mains 2 Way Adapter Plug Doubler Surveillance Adaptor

Second bug

It is also claimed a separate Wi-Fi bug was supplied by private investigation firm Quest Global. Its chairman is former Metropolitan Police commissioner Lord Stevens.

The claimants' documents say that Quest invoiced for 405 hours of listening and transcribing.

The recordings, it is alleged, captured "private, confidential, personal and Sir Frederick's privileged conversations with his lawyers, and with his daughter's trustees, bankers and businesspeople"more

Oddly, there is no mention of the video bug which recorded the incident. It does however make the nephew eligible for our Darwin Award for capturing himself with his own bug. ~Kevin

Friday, May 15, 2020

And, The Number One Spy Job Nobody Would Want Is...

North Korea has axed its spy chief as well as the long-running head of Kim Jong Un’s security — signs of a major shakeup during the ongoing mystery over the dictator’s status.

Jang Kil Song was ousted as head of the Reconnaissance General Bureau (RGB), the North’s military intelligence agency, according to the Korea Herald, citing a report by South Korea’s Unification Ministry.

The RGB is behind the Hermit Kingdom’s most high-profile attacks as well as spy missions, including those against the US, the report says...

(Surprise) No reason was given for the switch. more

Assembling an Ikea Spy Case

Ikea and some of its former executives were ordered to face trial in France over accusations they conspired with police officers to spy on staff.

An Ikea unit in France was accused of collecting information on employees and people applying to work for the furniture giant, according to an indictment dated April 30.

In exchange for a fee, police officers provided confidential information to former Ikea executives on past convictions.

This was in turn used to dismiss staff or turn down applications.

Ikea France said it has “always firmly disapproved” of such practices. more

NJCCIC Publishes: Tips for Teleworkers, Remote Access Security

For many organizations, telework programs have been in practice for years – whether as part of the organization’s everyday work program or as a component of their business continuity plans.

For those organizations, policies, educational programs, technologies, and support services for the remote workforce are well established. For organizations engaging in telework for the first time, defining expectations is a good starting point.

First, create a telework policy that addresses the following:
  • The scope of the telework program, roles and responsibilities, eligibility to telework (not all jobs can be performed remotely), 
  • work hours and paid time-off, 
  • the suitability of the alternate workplace and its related safety requirements, 
  • responsibility for equipment and supplies, 
  • operating costs and expenses, 
  • and requirements for physical and information security. more

NSA Publishes: Survey of Videoconferencing Apps

Selecting and Safely Using Collaboration Services for Telework
During a global pandemic or other crisis contingency scenarios, many United States Government (USG) personnel must operate from home while continuing to perform critical national functions and support continuity of government services. With limited access to government furnished equipment (GFE) such as laptops and secure smartphones, the use of (not typically approved) commercial collaboration services on personal devices for limited government official use becomes necessary and unavoidable. survey

Tuesday, May 12, 2020

Agribusiness Espionage: The Scientist and the Spy

Deputy Cass Bollman was about to enjoy a coffee break at a gas station in Iowa when the alert came across his radio: “Asian male wearing a suit walking through a farm field. … Nature of incident: suspicious.”

Bollman raced to the scene, a little northeast of Des Moines, where he talked to a farmer who had spotted the odd figure in the field. A few minutes later, Bollman had pulled over an SUV driven by Robert Mo, a Chinese national.

So begins one of the most unexpected stories of espionage ever told—in this case, by Minnesota journalist Mara Hvistendahl in her new book, “The Scientist and the Spy.”

Wi-Fi Internet Communicator Hidden in a Calculator Hack

Sometimes a device is just too tempting to be left untouched. For [Neutrino], it was an old Casio calculator that happened to have a perfectly sized solar panel to fit a 128×32 OLED as replacement.

But since the display won’t do much on its own, he decided to connect it to an ESP8266 and mount it all inside the calculator’s housing, turning it into a spy-worthy, internet-connected cheating device, including a stealthy user interface controlled by magnets instead of physical buttons. more


It wouldn't take much to turn this into a Wi-Fi bug.

Saturday, May 9, 2020

"Recording suspects is his hobby, Your Honor, an innocent hobby."

CA - An Alameda County sheriff's sergeant pleaded no contest this week to four misdemeanor eavesdropping counts for recording conversations between juvenile suspects and their attorneys in 2018.

The plea agreement for Sgt. James Russell, who originally was charged with four felony counts, calls for him to be placed on 3 years'
probation and perform 180 hours of community service...

Odbert (Russsell's attorney) said at the hearing that Russell wasn't present when the recording began and had no intent of using the conversations between Plaine and the juveniles as a way of building a case against themmore

Pew Comments on Relationship Health - It Stinks

Most Americans think snooping on a partner’s phone is a bad thing to do, but that hasn’t stopped more than a third of people in committed relationships from doing it anyway, according to Pew research published Friday.

Of those surveyed, 34 percent of people in committed relationships admitted to snooping on their partner’s phone without their knowledge. Interestingly, the survey also found that 42 percent of women (who are in relationships) say they’ve snooped through their current partners’ phones without them knowing, while just 25 percent of men say they have.

As many of us find ourselves cooped up with our partners and our phones for the foreseeable future, the researchers suggest that using this technology is not necessarily great for the health of our long-term relationships. more

WeChat - More Than Just Chat - You're Teaching it Censorship Skills

The incredibly popular Chinese chat app WeChat is being put under a microscope by The Citizen Lab.

In a study, the researchers found that not only is WeChat spying on the chats of Chinese users, but it’s also looking in on chats from foreigners with the goal of fueling its censorship algorithms...

The company has been known to monitor all of the chats of Chinese users as they come through.

However, the study found that images and documents shared between users outside of China are scanned and flagged for potentially politically sensitive content.

Anything that matches is hashed and flagged when someone shares them with a Chinese account. The flagged content is fed to a machine-learning system that is used to censor content in China. That means WeChat spying isn’t limited to Chinese users, which is quite scary for anyone using the app. more

Spy Satellite NROL-44 Victum of Lockdown... Perhaps

The next flight of United Launch Alliance’s triple-barrel Delta 4-Heavy rocket has been delayed from June to late August, military officials said Friday.

The heavy-lift rocket will carry a classified National Reconnaissance Office payload into orbit ... capable of eavesdropping on foreign communication signals.

Military officials did not disclose a reason for the two-month delay. more

Google Searches for TSCM and Wiretap up in Past Week


This Week in Spycam News

Canada - A judge has certified and approved a class action settlement against a late former Belleville orthodontist, who was alleged to have made video recordings of patients without their consent or knowledge. Dr. Anthony Garry Solomon had been charged with making and possessing child pornography, and voyeurism in 2017, but criminal charges were withdrawn following his death a short time later and a civil class action case has been underway for the past two and a half years. more

LA - More than 10 people who worked in the past for a Plaquemine snowball stand manager accused of videotaping people in the shop's bathroom have contacted the Iberville Parish Sheriff's Office since the manager's arrest on May 2, making a current total of 24 employees who may have been affected, Sheriff Brett Stassi said Friday. more  more

 LA - The Assumption Parish Chamber of Commerce chairman was arrested in St. Gabriel this week after filming a man in public bathroom without consent, authorities said. more

Canada - Multiple charges relating to voyeurism and child pornography have been laid against a Clarington resident who police say formerly worked as a self-employed handyman. more

Namibia - Up to 34 children could be involved in a case in which a Windhoek resident yesterday appeared in cour..."The videos contain various children performing sexual acts in a bathroom where a covert camera was [suspected to have been] set up," Shikwambi said. "Videos were also obtained from a covert camera placed in a toilet at a sporting event inWindhoek recording minor boys visiting the toilet at a municipal swimming pool."

UK - A man has appeared in court accused of killing his wife in an arson attack after spying on her with secret cameras and posting sexually explicit images of her online. more

FL - A Pensacola man is accused of secretly filming women in a Lowe's bathroom, according to a sheriff's report. more

UK - Coronation Street (a TV show) fans were left frustrated last night after the police failed to find Geoff's hidden camera. During the months that Geoff has been abusing Yasmeen, he set up a secret camera to spy on his wife. more

You know spy cameras are a big problem it becomes a popular TV show plot.
Updated: Spy Camera Detectors – Do they work?

Tuesday, May 5, 2020

Air-Gapped PC Power Supplies Spills the Screens

One of the most secure system arrangements today consists of air-gapped PCs. The reason being their total disconnection from the internet.

In February this year, it was reported that hackers can steal data from air-gapped PC using screen brightness and now the same can be done through their power supply.

Mordechai Guri, a cybersecurity researcher from the Israeli Ben Gurion of the Negev University has conducted an experiment that shows how power supply units (PSUs) can be exploited to extract information from both an air-gapped & audio-gapped computer.

Termed as POWER-SUPPLaY; the malware exploits the PSU using it as an “out-of-band, secondary speaker with limited capabilities”. The data that can be extracted includes different files & information of the user’s keystrokes transmittable up to 1 meters away along with passwords and encryption keys that the attacker could receive with a device that is five meters away from such as a smartphone...

The research does not deal with the question of how the malware will be implemented in the first place. The technique is very clever nonetheless. more

TSCM Nightmares Today, Reality Tomorrow

These give some technical surveillance countermeasures specialists nightmares.

Emerging technologies like the ones below are interesting. They could be used for illegal eavesdropping in the future. Combining the first two could produce a wireless bug that never has to have its batteries replaced. It could also be incredibly small.

Some people say, "the bad guys are always one step ahead of us."
I say, "do your homework and you will be one step ahead of them."

Ultra-Low-Power WiFi Radio Enables IoT Devices
  • Housed in a chip, it lets IoT devices communicate with existing WiFi networks.
  • Housed in a chip smaller than a grain of rice.
  • The radio could last for years on a single coin cell battery.

It consumes just 28 microwatts of power and does so while transmitting data at a rate of 2 megabits per second (a connection fast enough to stream music and most YouTube videos) over a range of up to 21 meters.



New Green Technology from UMass Amherst Generates Electricity ‘Out of Thin Air’


The laboratories of electrical engineer Jun Yao and microbiologist Derek Lovley at UMass Amherst have created a device they call an “Air-gen.” or air-powered generator, with electrically conductive protein nanowires produced by the microbe Geobacter.

The Air-gen connects electrodes to the protein nanowires in such a way that electrical current is generated from the water vapor naturally present in the atmosphere. “We are literally making electricity out of thin air,” says Yao.



Seeing Around Corners to Detect Object Shapes
Special light sources and sensors see around corners or through gauzy filters, enabling reconstruction of the shapes of unseen objects.

A technique was developed that enables reconstruction of images in great detail. Researchers computed millimeter- and micrometer-scale shapes of curved objects, providing an important component to a larger suite of non-line-of-sight (NLOS) imaging techniques.

Most of what people see — and what cameras detect — comes from light that reflects off an object and bounces directly to the eye or the lens. But light also reflects off the objects in other directions, bouncing off walls and objects.