Articles intended for TSCM technicians.

Tech watch: New style “shotgun” mic

Microphones come in all shapes and sizes. Some may be very small and used in covert applications. Others may just take on unique designs. This mic clearly adds the humorous effect, but it does go to show that microphones can be designed in any shape or size.

2021-09-30T09:23:48-04:00September 30th, 2021|

Mystery text messages freaking out both recipients and senders.

Everyone has at least some fear or concern that their cell phone may be vulnerable to some form of hacking or cyber attack.

This past week, a number of people (168,149 to be exact) surely thought that may have been the case when odd text messages -from them- started showing up on other peoples’ phones.

Ex-boyfriends, ex-girlfriends, bosses, relatives, and others received a number of text messages this past Wednesday that were not sent by the person labeled as the sender. Or at least, not sent recently…

Apparently, a server managed by Syniverse, and used by ALL major cellular carriers, had a failure back in February, 2019, on Valentine’s Day no less. The failure went uncorrected until November 7 when it was brought back online. All the messages were then sent. “Better late than never” does not necessarily apply when it comes to texts.

We heard […]

2019-11-09T18:17:12-05:00November 9th, 2019|

Ultrasonic eavesdropping and microphone jamming- researching Cuban ailments

Kevin Fu and Wenyuan Xu, researchers with the University of Michigan and Zhejiang University in China, study the use of ultrasonic waves that may have been a possible source of recent ailments of diplomats living in Cuba. Causes of the symptoms of the diplomats and their families have not yet been confirmed, but one of the possible causes offered was the use of some sort of sonic "weapon".  Hearing about this caused Fu and Xu to wonder if ultrasound could be the culprit. Their research tries to explain possible ways the effects that were described could have been created leading them to also investigate ultrasonic eavesdropping and microphone jamming.

2018-04-02T22:48:25-04:00April 2nd, 2018|

Early Spy Camera- circa 1890.

The temptation to use technology for spying has been with us for a long time. Carl Stormer purchased his first hidden camera- a "C.P. Stirn Concealed Vest Spy Camera"- when he was a young student of mathematics in Oslo. It was so small that the lens fit through the buttonhole in his vest with a cord that led down to his pocket, allowing him to snap his secret photos.

2018-01-04T10:54:18-05:00January 4th, 2018|

Tech alert: Ultrasonic inaudible sounds can take over your phone or computer.

Voice recognition systems built into your phone, computer, or other devices, such as Siri, Google Now, Cortana, or Alexa, can respond to ultrasonic sounds far above your hearing range. If a computer or smartphone has the voice features activated, the device could secretly be given commands to make phone calls, access malicious websites, or many other vulnerable features without the user being aware. This could be used for deliberate eavesdropping, surveillance, or other form of espionage attack.

2017-09-08T09:29:39-04:00September 7th, 2017|

Battery-free cell phone device could lead to long lasting bugs.

One of the challenges that eavesdroppers have faced over the years is being able to provide long lasting power to their devices. Researchers at the University of Washington have developed what they call a battery-free cell phone. For power, the unit can use ambient light and radio "backscatter" supplied by a base station up to 50 feet away.

2017-07-07T19:44:01-04:00July 7th, 2017|

In the news: Toy hacked by 6th grader becomes spy device

Reuben Paul, 11, tells a conference that smart cars, fridges, lights and even teddy bears can be used to spy on or harm people. Plugging into his laptop a Raspberry Pi Reuben scanned the hall for available Bluetooth devices, and to everyone’s amazement including his own, suddenly downloaded dozens of numbers, including some of top officials. Then using computer language Python he hacked into his bear via one of the numbers to turn on one of its lights and record a message from the audience.

2017-05-17T18:48:59-04:00May 17th, 2017|

Is your dash cam guilty of eavesdropping?

Most dash cams include the ability to record audio as well as video. Conversations recorded within the vehicle could be considered eavesdropping. With the audio active, you may be recording the conversations of passengers in your vehicle without their knowledge or permission. That could be an eavesdropping offense in many states in the US if they require all-party consent. If you have video of a valet damaging your car while taking it for a joyride, the evidence could be declared inadmissible due to the eavesdropping aspect of recording audio.

2017-01-04T15:12:18-05:00January 4th, 2017|

Technical Build-
Portable CCTV System for Executive Protection and TSCM

The Arlo wireless camera system by Netgear is a relatively inexpensive system that it is adaptable for a portable security application. Originally designed for the home market, the system has a number of limitations, but wireless transmission, motion detection, and long battery life make it useful in portable applications where quick deployment is needed.

2017-10-14T10:33:37-04:00December 29th, 2016|

Lawsuit against Colts alleges app is eavesdropping. But is it really? What determines an eavesdropping threat?

Most are familiar with the old question, “If a tree falls in the forest, but no one is there to hear it, does it make a sound?”  Here is the new one that lawyers are facing: “If a microphone is turned on, but no one is there to hear it, is it still eavesdropping?”

Fear of eavesdropping is helping to spawn lawsuits as so many devices in daily use now come with some sort of microphone built in. An Indianapolis Colts fan has brought a lawsuit against the Colts, their app developer, YinzCam, and LISNR who created the technology used.

The Colts smartphone app uses fairly new technology to help deliver news, information, and ads to their fans. It supposedly can activate the smartphone microphone and be able to detect ultra high frequency sounds, far above the normal range of […]

2016-12-16T20:23:31-05:00November 3rd, 2016|

Wireless keyboard eavesdropping threat

Security researcher Marc Newlin, of Bastille Networks, has revealed a security hole in a number of wireless keyboards and mice. They dubbed the hacking tool “KeySniffer“. The vulnerability can allow a hacker to eavesdrop on everything being entered from confidential text to passwords or financial information.

A similar hack was developed last year by @SamyKamkar for intercepting certain Microsoft keyboards.
Marc Newlin found vulnerabilities in the following manufacturers keyboards (there may be vulnerabilities in other products, these are just the ones tested at Bastille):

  • Anker
  • EagleTec
  • General Electric
  • Hewlett-Packard
  • Insignia
  • Kensington
  • Radio Shack
  • Toshiba

Some of these manufacturers have already issued software updates to fix the security holes. Marc’s page has links and more details for these products here: https://www.keysniffer.net/affected-devices
 
 


Marc Newlin explains the Keysniffer vulnerability.

The keyboards with this vulnerability use 2.4 GHz radio transmission. Although the 2.4 […]

2016-07-27T22:49:59-04:00July 27th, 2016|
Go to Top