Tuesday, September 25, 2018

Spray-on antennas unlock communication of the future

Hear the word “antenna” and you might think about rabbit ears on the top of an old TV or the wire that picks up radio signals for a car. But an antenna can be much smaller – even invisible. No matter its shape or size, an antenna is crucial for communication, transmitting and receiving radio signals between devices. As portable electronics become increasingly common, antennas must, too.
Wearable monitors, flexible smart clothes, industrial sensors and medical sensors will be much more effective if their antennas are lightweight and flexible – and possibly even transparent. We and our collaborators have developed a type of material that offers many more options for connecting antennas to devices – including spray-painting them on walls or clothes.
Our materials science lab focuses on nanomaterials, which are more than 100,000 times thinner than a human hair. In 2011, researchers in the Drexel University Materials Science and Engineering Department developed a way to combine metals with carbon or nitrogen atoms to create a material that’s a few atoms thick, very strong and good at conducting electricity. We call these materials MXenes (pronounced “maksens”), and we can make them with different metals – including titanium, molybdenum, vanadium and niobium.
Our most recent work has identified that mixing MXenes with water lets us spray antennas on any surface, including a brick wall or a glass window – and even use an inkjet to print an antenna on paper. This creates new opportunities for smaller, lighter, more flexible antennas to accompany devices that are also being made from more varied and versatile materials.

Tuesday, August 7, 2018

Television White Space Technology to Provide Long-Range Wireless Connectivity Up To 8 km

The Ammbr Foundation has released details on a long-range wireless technology that will make the Ammbr mesh router capable of picking up signals from up to eight kilometers (5 miles). The key in this technology is tapping into unused frequencies known as television white space (TVWS). The Ammbr foundation intends to help connect the 4.1 billion people who don't have Internet connections, through the implementation of innovative technology that allows improved connections in rural areas and over longer distances.
TVWS technology can operate in conditions where line-of-site is not possible due to obstructions such as vegetation and walls. Theoretical calculations show that a 600-MHz TV white space signal can cover 16 times as much area as a 2.4-GHz Wi-Fi signal. The technology will allow Ammbr routers to extend their range up to 8 km, provide a much wider coverage footprint and allow the devices to reach neighbouring routers in areas not possible before TVWS.

Tuesday, June 26, 2018

THE WIRETAP ROOMS...

The NSA’s Hidden Spy Hubs in Eight U.S. Cities. via, 
of "The Intercept".

THE SECRETS ARE hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program.

Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.

Friday, June 22, 2018

A WORLD CUP OF SPIES...



From our friend "Avi"in Israel..;-)

The power balance in Europe is shifting, which will impact the world of sports.

London, 2010. Petrodollars are flowing into Britain as Russian billionaires are buying luxury homes. Chelsea has just won the Premier League, thanks to its generous oligarch owner. Scotland Yard is investigating the polonium assassination of a Russian spy turned MI6 informant.

England and Russia are neck and neck favorites in the fierce race to become host of the football world cup 2018. They will stop at nothing to win, and huge bribes are involved. In FIFA’s own assessment, Russia is the worst candidate to host, but in the end England is humiliated with only two votes.

In a new documentary, journalists Niels Holm and Jon Adelsten enter the murky world of private intelligence agencies with a simple question: How did Russia win its world cup? We follow the enormous sums of money that have flown from extravagant stadium and infrastructure projects into the hands of Putin’s tight-knit circle of trusted oligarchs. The journalists soon find themselves in a world of dark secrets.

A World Cup of Spies will come out as the games kick in Moscow in June, 2018, showing how national football associations spent millions of public money on a James Bond-like contest.

Tuesday, June 19, 2018

Elon Musk: Tesla worker admitted to sabotage..


*Note: I would guess that the individual that should have followed through and scheduled that professional "Cyber TSCM Sweep" is probably shopping their resumé right about now....JDL~ 


Tesla's attempt to ramp up Model 3 production may have hit a new stumbling block --- employee sabotage.

In an email to Tesla employees late Sunday night, CEO Elon Musk says that an unnamed employee admitted to sabotaging the company's Freemont, California plant. The problem comes as Tesla scrambles to boost production of its Model 3 sedan to 5,000 a week by early July -- the rate at which Musk says the company can become profitable.


Shares of Tesla (TSLA) fell about 5% in trading Tuesday.

Musk said the Tesla employee had confessed to "quite extensive and damaging sabotage to our operations." The email said the employee made changes to the computer code of the company's manufacturing operating system. The employee also exported large amounts of highly sensitive company data to unknown third parties.

Saturday, June 16, 2018


Registration Open @ https://erii.org

Join ERII members, and Counterespionage, Counterintelligence and TSCM professionals from across the globe to discuss TSCM, cyber, counterespionage and counterintelligence news and events, see demonstrations of new TSCM equipment and network with colleagues. 
The 2018 ERII Conference experience will include presentations by top experts in the fields of Technical Surveillance Countermeasures (TSCM), Counterintelligence, Counterespionage, Cyber Countermeasures, Equipment Vendors and more. 
Conference ticket includes: breakfast & evening reception (for hotel guests), conference presentations, and catered lunch/beverages/snacks on ticketed conference day(s) (8:30 AM to 5:00 PM.)
US Government employee ticket discounts available. Contact Lisa LeaSure, ERII Development Director for more information.Phone: +1-757-716-7353 Ext: 102. Email: lml@erii.org

Friday, June 15, 2018

Economic Espionage and the Growing Case for Corporate Counterintelligence

In the 2016 movie, “Snowden” former National Security Agency intelligence contractor Edward Snowden uncovers massive amounts of illegally obtained data assembled to track digital communications from foreign governments, terrorist groups and ordinary Americans. For many, the biographical political thriller was a wakeup call. For those in risk management and information security, it reaffirmed what we probably already knew or suspected — that many different entities around the globe know quite a bit about where we work and live and our daily habits.
For corporate businesses, information protection is critical and the risks and threats keep changing. Now, the theft of information and intelligence is increasingly gathered on U.S. companies from foreign entities that use the results for a variety of different types of what is now called economic espionage.

Monday, June 11, 2018

Sonic and ultrasonic attacks damage hard drives and crash OSes

Sounds played over off-the-shelf or embedded speakers often require a reboot.

Attackers can cause potentially harmful hard drive and operating system crashes by playing sounds over low-cost speakers embedded in computers or sold in stores, a team of researchers demonstrated last week.

The attacks use sonic and ultrasonic sounds to disrupt magnetic HDDs as they read or write data. The researchers showed how the technique could stop some video-surveillance systems from recording live streams. Just 12 seconds of specially designed acoustic interference was all it took to cause video loss in a 720p system made by Ezviz. Sounds that lasted for 105 seconds or more caused the stock Western Digital 3.5 HDD in the device to stop recording altogether until it was rebooted.

The device uses flash storage to house its firmware, but by default it uses a magnetic HDD to store the large quantities of video it records. The attack used a speaker hanging from a ceiling that rested about four inches above the surveillance system’s HDD. The researchers didn’t remove the casing or otherwise tamper with the surveillance system.

Tuesday, May 15, 2018

Could your hotel room be bugged?

LOST luggage, missed connections and flight delays are some of the common concerns that plague nervous travellers.

But if you're heading to countries like China, Russia, Israel or even the UK, you might have another major issue: bugged hotel rooms.

Yep, it happens more often than you'd think. And while it's unlikely a holidaying family would be bugged by a suspicious government or deviant company, it's a real problem for some travelers, as these experts explain.

WHY WOULD SOMEONE BUG A ROOM?
"Security and safety are easily at risk anytime you enter a space where somebody else has had access prior to your arrival," says Jeffrey Jurist, president of SpyAssociates.com.
And there are plenty of reasons why you might be the target. "A hotel would not be the ones to bug a room, but a nefarious employee, hotel worker, investigator, or government agency would have their reasons: divorce, legal, military, insurance, espionage, business, financial," he added.
Jim Angleton, president and chief executive officer of crypto-currency company AEGIS FinServ Corp, explained how it could be carried out.
"An intelligence community might have someone gain access to the room by paying off a front desk person, who tells them - for money - which room a target or suspect is staying in," he said.

Tuesday, April 3, 2018

AP News Break: US suspects cellphone spying devices in DC

For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages.

The use of what are known as cellphone-site simulators by foreign powers has long been a concern, but American intelligence and law enforcement agencies — which use such eavesdropping equipment themselves — have been silent on the issue until now.

In a March 26 letter to Oregon Sen. Ron Wyden, the Department of Homeland Security acknowledged that last year it identified suspected unauthorized cell-site simulators in the nation’s capital. The agency said it had not determined the type of devices in use or who might have been operating them. Nor did it say how many it detected or where.
The agency’s response, obtained by The Associated Press from Wyden’s office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police departments. The Federal Communications Commission, which regulates the nation’s airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly.

The devices work by tricking mobile devices into locking onto them instead of legitimate cell towers, revealing the exact location of a particular cellphone. More sophisticated versions can eavesdrop on calls by forcing phones to step down to older, unencrypted 2G wireless technology. Some attempt to plant malware.

Saturday, March 10, 2018

Kestrel Flies High at NDIA SO/LIC Symposium & Exhibition

ComSec LLc- Professional Development TSCM Group | National Defense Industrial Association (NDIA)

Technical Security Specialist's (TSS) TM and Technical Security Instructors (TSI) TM from Canadian based Professional Development TSCM Group Inc., attended the 29th Annual SO/LIC Symposium & Exhibition organized by the National Defense Industrial Association (NDIA) this week in Arlington, VA, in support of our exclusive US distribution partner COMSEC LLc, located in Virginia Beach.

The event, has been a tremendous success with significant new interest in the Kestrel TSCM ® Professional Software | Signals Intelligence Support System (SISS) TM, including a live demonstration of our latest Kestrel ® Heat Mapping Display (HMD) technology.

HMD TM is the latest milestone within our developmental strategy, and supports our recently released Receiver Differential Signal Analysis (RDSA)TM, in full support of our growing market share, within the TSCM | SIGINT | RSSM TMspace across the public and private sector, within the national security apparatus.

This latest release v1.36.1 is a full installer (64-Bit), and is also available in a 32-Bit release, if required.

PDTG Inc., and COMSEC LLc, made a number of strategic alliances during the event, with a strong focus on powerful new government, and military based Software Defined Radio technology, discussions, for fixed, and portable mobile deployment.

Many delegates were impressed by the powerful, scalability, and uniqueness of the detection, capture and analysis tools, with a current support level for seven (7) different manufacturers, receivers and spectrum analyzers, and very much impressed by plans for another three (3) prominent SDR products to be supported prior to the end of the year.

During the event, high-level discussions with a number of SDR manufacturers, expressed interest in the Kestrel TSCM ®Professional Software | Signals Intelligence Support System (SISS) TM platform.

The HMD TM feature is just one, of a series of new and powerful, professional features and functionality, added to the Kestrel TSCM ® Professional Software in the past number of months.





Monday, January 15, 2018

HUNDREDS of Twitter Employees Paid to View "Everything You Post," & Private "Sex Messages..


Project Veritas has released undercover footage of Twitter Engineers and employees admitting that Twitter employees view"everything you post" on their servers, including private "sex messages," and "d*ck pics." The engineers also admit that Twitter analyzes this information to create a "virtual profile" of you which they sell to advertisers. James O’Keefe has just completed a book about this series entitled "AMERICAN PRAVDA: My fight for Truth in the Era of Fake News." The book will be released by St. Martin’s Press on January 16, 2018.

More here.

Thursday, January 4, 2018

Be Careful! You Can be Bugged in the Office..

Is your office bugged? Use these tips to detect bugs and electronic eavesdropping devices in your office.

Bugs, these treacherous tiny electronic devices can infest your home or even your office. Just like real life bugs, these devices are able to hide in small corners and mostly go unnoticed. With bugs near you in your workplace, you could disclose valuable information to strangers. People can steal your ideas, rob your intellectual property and use your private information against you.
You don’t want these things happening to you, right? So, how can you prevent your information from getting into the wrong hands? Here are some important tips from professionals to save you from getting bugged in the office.

1.    Keep your Eyes Open

Always be on the lookout for those people who need confidential and valuable information at work. In case you sense that employees or competitors have obtained information about matters that are supposed to be confidential, think how they have acquired this information which only you know of.

2.    Unfamiliar Faces

Aside from your colleagues, also keep an eye out for unfamiliar visitors who visit your office. Pay close attention to people who claim to be inspectors, technicians and exterminators. Buggers can sometimes disguise themselves as workers and install their malicious devices to steal your confidential information.

3.    Lookout for Vehicles

Be cautious of vehicles like vans and panel trucks that may loiter near your building. Also, keep an eye out for the vehicles that appear in your area repeatedly. There could be someone inside the vehicle, listening to your conversations through the electronic bugs they have set in your office.

4.    Be Cautious of New Things

Things that come in your office may already be bugged by those wanting to steal your confidential information. Have the items arriving in your office checked by security to ensure that there aren’t any visible suspicious electronic devices attached to them.

5.    Look for Intrusion

Hone your senses to detect signs of potential intrusion. Examine your office rooms for any suspicious object and keep your ears open for odd clicks and noise. If there is a television in your office and it experiences signal interferences, then there might be a transmitter nearby.

6.    Master the Details

Master every detail of your room like the position of decorative items, light fixtures and exit signs. Be on the lookout for even a slightest change in the position of your belongings.

7.    Bugs May Already be There

You can prevent bugs from making their way into your office. But, what if they’re already there? The only thing to do in this case is here a professional to detect and sweep bugs from your office.

If you didn’t know about these important tips and think that you’ve been bugged already, hire a TSCM professional from ComSec to perform a bug sweep and get rid of any potential bugs in your office. 
Contact ComSec, we can help.