Thursday, September 22, 2016


Tips on What Not To Do and The Best Way to Find a Hidden Camera or Spy Gadget

f you suspect your business or home is under surveillance with a hidden camera or spy gadget, you may not know where to turn for help. Chances are your quest will include an online search for the best way to find a hidden camera or spy gadget. 

If you aren’t familiar with the acronym TSCM (technical surveillance countermeasures) your search for help may be lengthy. In fact, typing the subject line of this article in a search engine will lead you to a variety of suggestions including hiring a private investigator or using a spy gadget store for services. 

Others suggestions include performing your own physical search, buying a “cheap” bug detector or choosing the “cheap” bug sweep option. While all of these options may seem like a solution, we caution you to consider the following information before making a decision.

Read more here.

Thursday, August 25, 2016

This malware sold to governments could help them spy on iPhones...

Many people assume their iPhones are secure, but new research sent Apple scrambling to fix vulnerabilities that left users at risk.
Spyware relying on three previously unknown, or “zero-day,” flaws in Apple’s iOS mobile operating system for years made it possible for governments to take over victims' phones by tricking them into clicking on a link in a text message, according to new reports from Lookout, a cybersecurity firm that looks for security holes in mobile products, and Citizen Lab at the University of Toronto’s Munk School of Global Affairs.
"This is the most sophisticated bad actor we have ever seen targeting mobile phones out in the wild," said Mike Murray, vice president of security research at Lookout.
The malware, which the researchers said came from an Israeli company called NSO Group that was bought by the U.S. private equity firm Francisco Partners in 2014, was used to target journalists and activists in some cases, according to Citizen Lab, a group focused on the intersection of technology and information security.

Friday, August 5, 2016

Spy gadgets aren’t about exploding cigarettes anymore...

James Bond and Mission: Impossible (the original TV show and the movies) have colored the way we think of spy tech. Watching old spy movies, one would think intelligence gathering hinged on cigarette rocket launchers, courtesy of Q Branch, or impossibly lifelike masks.

And that’s not completely wrong — if a bit overboard. Intelligence tools are often subtle and creative. But modern intelligence gathering is simultaneously less gaudy and far more effective than what’s seen on the screen.

This was readily apparent at the 2016 Department of Defense Intelligence Information Systems (DoDIIS) Worldwide conference in Atlanta, Georgia, Aug. 1-3, where officials from DoD, the intelligence community and the private sector gathered to share the latest in intelligence tech.

Conference Coverage: DoDIIS Worldwide 2016

Instead of “spy gadgets” seen in the movies, modern intelligence tools are more about processing large amounts of data in real- or near-real-time to give operatives on the ground as much information as possible during missions.

For the CIA, this change has been a natural response to a shift in the way intelligence is gathered, according to Sean Roche, the agency’s associate deputy director for digital innovation.

These days, open source intelligence — information gathered by culling publicly available sources — “is as valuable and more valuable everyday as the information we get clandestinely. The old story is that open source was always doing good things. But unless a paper was marked ‘top secret,’ it didn’t seem to have the same weight. We know that not to be true today.”

Thursday, August 4, 2016

Registration Open for 2016 Espionage Research Institute International (ERII) Annual Counterespionage Conference

VIRGINIA BEACH, Va. - Aug. 4, 2016 - PRLog -- ERII today announced registration is open for the2016 Annual ERII Counterespionage Conference, an annual gathering of worldwide technical surveillance countermeasures (TSCM), counterintelligence and counterespionage professionals.
The conference will be held September 9-11, 2016, at the Embassy Suites Old Town in Alexandria, Virginia. ERII membership 3-day conference tickets are offered at a $200 discount as compared to non-member tickets through August 9, 2016 only. Single-day conference tickets are also available for ERII members and non-members.

Prior to the conference, Professional Development TSCM Group will provide two Kestrel TSCM Software training sessions. A Basic Operator Training session for government, government contractors & military will be held on September 6, 2016. On September 7-8, 2016 an Advanced Operator Certification class will be offered for ERII Members and select attendees.

Tuesday, August 2, 2016

Judge blasts FBI for bugging courthouse..

The FBI violated the Fourth Amendment by recording more than 200 hours of conversation at the entrance to a county courthouse in the Bay Area, a federal judge has ruled.

Federal agents planted the concealed microphones around the San Mateo County Courthouse in 2009 and 2010 as part of an investigation into alleged bid-rigging at public auctions for foreclosed homes. In November, lawyers representing five defendants filed a motion arguing that the tactic was unconstitutional, since the Fourth Amendment bans unreasonable searches.

"The government utterly failed to justify a warrantless electronic surveillance that recorded private conversations spoken in hushed tones by judges, attorneys, and court staff entering and exiting a courthouse," US District Judge Charles Breyer wrote in an order (PDF) published yesterday. "Even putting aside the sensitive nature of the location here, Defendants have established that they believed their conversations were private and they took reasonable steps to thwart eavesdroppers."

Breyer concluded that the disputed evidence must be suppressed. At a hearing next week, he'll consider whether the recordings tainted the rest of the prosecution's case.

Read more here.

Tuesday, June 28, 2016

Facebook listens and records your conversations...

Have you been on your computer and seen an ad for the brand of shoes you were just talking about with your coworker? Or seen a link to a special sale that Home Depot is having minutes after you heard about it on your radio?

Coincidence? Maybe not.
Recent reports suggest that this information is being gathered in the sneakiest way. And it all has to do with a certain app that we all use multiple times a day, every day.

We're talking about the Facebook app, specifically its always-listening feature.

According to Kelli Burns, a mass communication professor at the University of South Florida, not only is Facebook gathering information from you based on the conversations you're having, it's showing you ads for products related to what you were talking about.

"The tool appears to be using the audio it gathers not simply to help out users, but to listen in to discussions and serve them with relevant advertising," Burns explained. In an effort to prove her theory, Burns would talk about certain topics with her phone nearby and then observe that ads related to her conversations would appear on her Facebook News Feed.

Monday, May 23, 2016

Beware of keystroke loggers disguised as USB phone chargers

FBI officials are warning private industry partners to be on the lookout for highly stealthy keystroke loggers that surreptitiously sniff passwords and other input typed into wireless keyboards.

The FBI's Private Industry Notification is dated April 29, more than 15 months after whitehat hacker Samy Kamkar released a KeySweeper, a proof-of-concept attack platform that covertly logged and decrypted keystrokes from many Microsoft-branded wireless keyboards and transmitted the data over cellular networks. To lower the chances that the sniffing device might be discovered by a target, Kamkar designed it to look almost identical to USB phone chargers that are nearly ubiquitous in homes and offices.
"If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information," FBI officials wrote in last month's advisory. "Since the data is intercepted prior to reaching the CPU, security managers may not have insight into how sensitive information is being stolen."