Sunday, February 12, 2023

Patent: Adding a Camera to the Apple Watch

Apple was granted a new patent for a detachable watch-based camera retention system...


This new strap-based system is hardly Apple's first attempt at patenting watch-based camera functionality. In 2019, the company was awarded US-10331083-B1 for a watch band with an integrated, flexible optical sensor. If made available, this rotatable camera would allowing photos to be taken without the need to remove the watch from the user's wrist...

While a high-quality embedded camera could have practical use for some, it does raise potential privacy and security concerns for others.

The ability to capture photos covertly by removing the need for a larger, handheld camera or phone opens the door to anything from secret, unauthorized, and compromising photos to increased risk of corporate espionage

The embedded cameras would require a new level of security and awareness to ensure they were not improperly used in areas such as schools, locker rooms, restrooms, or in areas where confidential documents and information are at risk of being captured. more

Believe It or Not: Phone Company Not Taking a Customer's Money

South Africa: Police can’t pay network provider Vodacom for spying services, hampering crime-fighting efforts.

Efforts by the SA Police Service to fight crime were hampered after cellphone network provider Vodacom cut services, such as assisting in locating, intercepting calls and eavesdropping on calls and messages for all the network’s subscribers.

Crime intelligence requires cellphone network providers to spy on criminal suspects so that evidence can be obtained through a call interception process. more

Teacher Taps Her Way Into Their Hearts

PA - Wiretapping Charges - A Laurel Highlands High School teacher is accused of recording a student without his permission and sending the video to another student.

Ashley Thurby-Kolesar, 33, of Uniontown, faces felony charges of intercepting communications, disclosing intercepted communications and criminal use of a communication facility.

According to the criminal complaint, state police began an investigation into Thurby-Kolesar in mid-January amid concerns she was having an inappropriate relationship with a 17-year-old student. more  video

Corporate Espionage Can Be Very Cost-Effective (if undetected)

UK - A traffic clerk at a London warehouse was asked to leak confidential corporate information to a rival in exchange for a £50 payment from a delivery driver, according to an extraordinary corporate espionage claim lodged in the High Court. 

In the claim filed last week, Sheffield-based logistics firm Tuffnells alleged that DX Group employees Tom Middlewood, Jim Sinden and Joe Trappitt — all former employees of Tuffnells — conspired to obtain daily customer service reports. more You may also want to read: The Employee Competitor… and what to do about it

Spy History: Life Imitates Art - The Shoe Bug

...The discovery of a “shoe bug” then prompted SY (US State Department - Division of Security) to modify its ACRs (Acoustic Conference Room)...
In 1969, Harry G. Barnes, Jr., Deputy Chief of Mission in Bucharest, Romania, called a classified conference, which met in the “bubble.” SY officer Lou Grob was monitoring the meeting from another room and heard the conversation. He immediately informed the Administration Officer (the RSO’s superior) that there was a bug in the ACR. After searching, they found something resembling Don Adams’s “shoe phone” from the 1960s television series Get Smart!--the bug was located in the heel of Barnes’s shoe. 

Barnes had had the butler take his shoes out to be modified, and someone had installed the bug in the process. After this incident, SY officers covered ACRs with Reynolds plastic wrap to reduce the radiation of low-power devices such as shoe bugs until the proper security modifications could be made. more  "Psst... Wanna buy some spy shoes? Click this."

Tuesday, February 7, 2023

Balloon Incident Reveals More Than Spying

There is nothing new about superpowers spying on one another, even from balloons. But for pure gall, there was something different this time...

It may be months before American intelligence agencies can compare the audacious flight of a Chinese surveillance balloon across the country to other intrusions on America’s national security systems, to determine how it ranks.

After all, there is plenty of competition.

There was the theft of the designs of the F-35 about 15 years ago, enabling the Chinese air force to develop its own look-alike stealth fighter, with Chinese characteristics. There was the case of China’s premier hacking team lifting the security clearance files for 22 million Americans from the barely secured computers of the Office of Personnel Management in 2015. That, combined with stolen medical files from Anthem and travel records from Marriott hotels, has presumably helped the Chinese create a detailed blueprint of America’s national security infrastructure...
Not surprisingly, now it is coveted by military and intelligence officials who desperately want to reverse-engineer whatever remains the Coast Guard and the Navy can recover. more

Extra Credit: Spy vs Spy: A brief history of balloon spying & Thaddeus S. C. Lowe

NY AG Spikes Spyware

The New York Office of the Attorney General has announced punitive measures against Patrick Hinchy and 16 of the companies he owns, for illegally promoting spyware.


Since 2011, Hinchy has owned and operated numerous companies, including the 16 investigated by the New York OAG, for selling and promoting spyware targeting Android and iOS devices, including Auto Forward, Easy Spy, DDI Utilities, Highster Mobile, PhoneSpector, Surepoint, and TurboSpy.

Once installed on victim devices, the spyware would collect and exfiltrate data such as call logs, text messages, photos, videos, emails, Chrome browser data, location, and data from messaging and social media applications, including WhatsApp, Skype, Facebook, Instagram, and Twitter.

The spyware was sold to ‘customers’ looking to spy on their spouse, colleagues, or other individuals, and was installed on the victims’ devices without their knowledge and without notifying them of the data collection and exfiltration activities...

Collected data, the New York OAG has discovered, was being transmitted in an insecure manner, which exposed it to potential cyberattacks and snooping...

The New York OAG fined Hinchy and his companies $410,000 in penalties and ordered them to modify the software so that it would notify device owners of the data collection activities. more

AT&T Goes to the Dogs... or, Fetch 5GK9

AT&T has partnered with Ghost Robotics to test the many use cases of a fleet of 5G-connected robotic dogs in public safety and first response...

Surveillance
One use case involved robotic dogs with wireless network-connected cameras that were deployed at military bases for patrol. At Tyndall Air Force Base in Florida, video feeds in real-time are sent to base personnel who always track activity on the base.

This same robotic dog could be used in commercial use cases either indoors or outdoors to patrol the perimeter of structures such as warehouses, logistics facilities, shopping malls or fleet centers. more

Thursday, January 19, 2023

Workers Foil Bosses’ Surveillance Attempts

Companies tracking employees’ productivity run up against inventive workarounds.

Lisa Crawford... is wary of her computer falling asleep when she gets up to throw in a load of laundry...Her solution? Sloth TV, a live-cam of a Costa Rican wildlife rescue ranch...Ms. Crawford pulls up the stream on a second monitor. Her computer stays awake...

Mr. Dewan had learned that his computer wouldn’t go to sleep or mark him as “idle” during a presentation...

Mr. Abbas wrapped the cord of his computer mouse around a rotating desk fan. Its motion kept the mouse moving and prevented his computer from shutting down. “I logged on, went to the gym,” he says.

For workers who aren’t as handy, mouse jigglers are for sale on Amazon. “Push the button when you’re getting up from your desk and the cursor travels randomly around the screen—for hours, if needed!” says one review. more

How IBM Trolled East German Spies

In the late 1960's IBM knew its technology was being smuggled into Communist block countries. One designer decided to sent a message etched into one of the circuit boards of the IBM 360 computer. Written in Russian, the message loosely translates to, "When do you want to stop to swipe. Own design is better."


Thanks to one of our readers... Hi Kevin,
Your latest post incorrectly states the name of the U.S. company whose semiconductor engineers put a hidden message in their computers for GDR's Stasi semiconductor spies to see. I said "DEC" in my email because that was the name of Digital Equipment Corporation--not IBM.

Also, the message wasn't "etched into one of the circuit boards of the IBM 360 computer", as you stated--it was microscopically etched onto the silicon die of a DEC memory chip that was used in DEC (not IBM) computers, and could only be seen after someone used acid to dissolve the chip packaging to expose the die for reverse-engineering. I thought all that would be clear to you from the video, so I didn't belabor it.

You might want to correct that info on your website.

Cheers,

Attorney's Wiretap Claims Against Old Firm To Continue

Vrdolyak Law Group LLC must face a proposed class action alleging it recorded the conversations and phone calls of employees without their consent in violation of the Federal Wiretap Act and state laws, a federal court ruled.


Plaintiff Daniel Alholm timely filed his state and federal wiretapping claims against the law firm, Judge Mary M. Rowland of the US District Court for the Northern District of Illinois said Tuesday.

Rowland rejected the firm’s argument that Alholm filed the wiretapping claims after the two-year statute of limitations had run, and denied its motion to dismiss as to those claims. She also dismissed Alholm’s fraud claims against the firm, but affirmed that the court would exercise supplemental jurisdiction over his state law misappropriation of likeness claims.

Alholm alleged that the firm surveilled employees in both its Chicago and Nashville offices, recorded conference calls and employees’ individual calls, and made unethical management and financial decisions. more

Moral: If you are a business that needs to record workplace activity, consult with a law firm that knows the local laws, first.

Wednesday, January 18, 2023

Cautionary Tale: Secreted Cell Phones

UK - Match of the Day presenter Gary Lineker has laughed off the moment sex noises transmitted by a YouTube prankster disrupted the show's live coverage.

Noises from a porn clip were heard as Lineker presented pre-match build-up before the Wolves v Liverpool fixture.

A frenzied studio hunt uncovered a planted mobile phone
- and YouTube prankster Daniel Jarvis claimed he was behind the stunt on Tuesday's show. The BBC apologised to any viewers who were offended.

But Lineker, who later tweeted a picture of the mobile phone he said was "taped to the back of the set", said he thought there was nothing to apologise for. Calling it a "good prank", he said: "As sabotage goes it was quite amusing." more

In another environment a hidden cell phone could well have been used as an eavesdropping bug. 

We're not talking expensive iPhones here. Cheap, mini-sized phones can do the job too. Short-term, quick-drop, and expendable. Another good reason to conduct Technical Surveillance Countermeasures inspections in corporate offices and conference rooms.

Monday, January 16, 2023

Spybuster Tip #823 - Remote Control Duplicators

Never let your door / gate opener fob out of your control.

Here's why... Anyone (service person, neighbor, guest, valet, etc.) only needs to have access to your fob for a few seconds to make one for themselves.

Fob duplicators are cheap, available and easy to use... (more detailed version here)


Sunday, January 15, 2023

Videos About Spy Cameras

Berning Robot SC Electronic 35mm camera

Serial number 0-01486. Schneider Xenagon 30mm lens, for covert uses. This 35mm camera manufactured in the 1980s takes images 16x16mm in size on its own small diameter cassettes which allow 40 monochrome or 35 colour images to be taken (colour film being thicker than black and white, hence the different capacities). The camera has an interchangeable back, eliminating the need for rewinding film in camera. The camera uses a TTL metering system. The lens has a fixed f5.6 aperture, which allows shutter speeds to be set between 4 and 1/500 of a second. Manual settings are possible. Images can be shot at the rate of one frame every 1.5 seconds. The slowness of the motorised wind on minimises the noise of the camera operationally. Various shutter release mechanisms are known, both mechanical and electronic, including radio control. Mossad allegedly developed an infra-red pulse controlled shutter release. Purported to have been designed to the specifications of the Israeli intelligence service, the camera was intended for covert surveillance. Both its size being around the size of a cigarette packet and its silent operation make it very suitable. It was also certainly used by the East German STASI and other intelligence agencies. The size of the camera lends itself to use in a variety of concealments. Examples evidenced include Sony ‘Walkman’ cassette players, books and handbags. A high quality button frontage for the lens exists. This model comes with an adapted bag concealment, where the lens shoots through a decorative metal emblem on the side of the bag and the shutter is fired by a concealed button. and many more videos from spycamerasaurus, @spycamerasaurus3745

Friday, January 13, 2023

Corporate Espionage: Newly Identified Hacker Group - Dark Pink

A newly identified hacker group Dark Pink attacked seven high profile targets,
including government and military institutions, in Southeast Asia and Europe from June to December 2022, Russian cybersecurity company Group-IB said.

The main goal of the hacker group is corporate espionage, as criminals are trying to steal documents and record sounds from the electronic devices of the victims, the Russian cybersecurity firm said.

The hackers sent their victims email messages containing a link to a website, according to the statement. When the victim clicked on this link, a malicious file was downloaded, which then stole personal information from devices, including passwords, browser history, and data from Viber and Telegram. more