Articles intended for TSCM technicians.

Tech watch: New style “shotgun” mic

Microphones come in all shapes and sizes. Some may be very small and used in covert applications. Others may just take on unique designs. This mic clearly adds the humorous effect, but it does go to show that microphones can be designed in any shape or size.

2021-09-30T09:23:48-04:00September 30th, 2021|

Ultrasonic eavesdropping and microphone jamming- researching Cuban ailments

Kevin Fu and Wenyuan Xu, researchers with the University of Michigan and Zhejiang University in China, study the use of ultrasonic waves that may have been a possible source of recent ailments of diplomats living in Cuba. Causes of the symptoms of the diplomats and their families have not yet been confirmed, but one of the possible causes offered was the use of some sort of sonic "weapon".  Hearing about this caused Fu and Xu to wonder if ultrasound could be the culprit. Their research tries to explain possible ways the effects that were described could have been created leading them to also investigate ultrasonic eavesdropping and microphone jamming.

2018-04-02T22:48:25-04:00April 2nd, 2018|

Early Spy Camera- circa 1890.

The temptation to use technology for spying has been with us for a long time. Carl Stormer purchased his first hidden camera- a "C.P. Stirn Concealed Vest Spy Camera"- when he was a young student of mathematics in Oslo. It was so small that the lens fit through the buttonhole in his vest with a cord that led down to his pocket, allowing him to snap his secret photos.

2018-01-04T10:54:18-05:00January 4th, 2018|

Tech alert: Ultrasonic inaudible sounds can take over your phone or computer.

Voice recognition systems built into your phone, computer, or other devices, such as Siri, Google Now, Cortana, or Alexa, can respond to ultrasonic sounds far above your hearing range. If a computer or smartphone has the voice features activated, the device could secretly be given commands to make phone calls, access malicious websites, or many other vulnerable features without the user being aware. This could be used for deliberate eavesdropping, surveillance, or other form of espionage attack.

2017-09-08T09:29:39-04:00September 7th, 2017|

Battery-free cell phone device could lead to long lasting bugs.

One of the challenges that eavesdroppers have faced over the years is being able to provide long lasting power to their devices. Researchers at the University of Washington have developed what they call a battery-free cell phone. For power, the unit can use ambient light and radio "backscatter" supplied by a base station up to 50 feet away.

2017-07-07T19:44:01-04:00July 7th, 2017|

In the news: Toy hacked by 6th grader becomes spy device

Reuben Paul, 11, tells a conference that smart cars, fridges, lights and even teddy bears can be used to spy on or harm people. Plugging into his laptop a Raspberry Pi Reuben scanned the hall for available Bluetooth devices, and to everyone’s amazement including his own, suddenly downloaded dozens of numbers, including some of top officials. Then using computer language Python he hacked into his bear via one of the numbers to turn on one of its lights and record a message from the audience.

2017-05-17T18:48:59-04:00May 17th, 2017|

Is your dash cam guilty of eavesdropping?

Most dash cams include the ability to record audio as well as video. Conversations recorded within the vehicle could be considered eavesdropping. With the audio active, you may be recording the conversations of passengers in your vehicle without their knowledge or permission. That could be an eavesdropping offense in many states in the US if they require all-party consent. If you have video of a valet damaging your car while taking it for a joyride, the evidence could be declared inadmissible due to the eavesdropping aspect of recording audio.

2017-01-04T15:12:18-05:00January 4th, 2017|

Technical Build-
Portable CCTV System for Executive Protection and TSCM

The Arlo wireless camera system by Netgear is a relatively inexpensive system that it is adaptable for a portable security application. Originally designed for the home market, the system has a number of limitations, but wireless transmission, motion detection, and long battery life make it useful in portable applications where quick deployment is needed.

2017-10-14T10:33:37-04:00December 29th, 2016|

Wireless keyboard eavesdropping threat

Security researcher Marc Newlin, of Bastille Networks, has revealed a security hole in a number of wireless keyboards and mice. They dubbed the hacking tool “KeySniffer“. The vulnerability can allow a hacker to eavesdrop on everything being entered from confidential text to passwords or financial information.

A similar hack was […]

2016-07-27T22:49:59-04:00July 27th, 2016|
Go to Top