Articles intended for TSCM technicians.

Tech news: Extracting audio from video, or how to turn a bag of chips into a microphone

As technology advances, new threats to privacy emerge as well. What only takes place in a lab today, may be more commonplace in the near future.
The team from Massachusetts Institute of Technology (MIT), Microsoft and software firm Adobe created an algorithm that created useful audio from the videoed vibrations caused by soundwaves of a glass of water, the leaves of a plant and even a packet of crisps filmed through soundproof glass.

‘We’re recovering sounds from objects,’ said lead researcher Abe Davis in a statement. ‘That gives us a lot of information about the sound that’s going on around the object, but it also gives us a lot of information about the object itself, because different objects are going to respond to sound in different ways.’

Typically this technique requires a high-speed camera recording separate video […]

2016-12-16T20:23:48-05:00August 5th, 2014|

Fox News: One method for dealing with hidden cameras…

ANCHORAGE, AK — A group of researchers studying sea lions in Round Island, Alaska, saw a fox coming along. Being the curious people they are, they decided to set up a video camera to record the animal.

Unfortunately, the fox was more aware of its surroundings than the sea lions. The animal immediately spots the camera, chomps down on it and tries to carry it away to eat later.

After a brief chase, the researchers were able to recover the camera. The fox managed to chew off part of the lens.

2016-12-16T20:23:48-05:00July 27th, 2014|

Good guys as targets. Hacker who shipped heroin to cyber security expert gets arrested.

Working in any aspect of security can have it’s own dangers. Brian Krebs, known for his cyber security blog KrebsOnSecurity.com was the target of a cybercrook known as “Fly”.  Brian, though, was good enough to uncover the identity of the bad guy. The “Fly” was arrested in Naples, Italy, earlier this month.

From Brian Krebs, Krebsonsecurity.com:

A Ukrainian man who claimed responsibility for organizing a campaign to send heroin to my home last summer has been arrested in Italy on suspicion of trafficking in stolen credit card accounts, among other things, KrebsOnSecurity.com has learned.

Passport photo for Sergei “Fly” Vovnenko. He was arrested in Naples, Italy earlier this month.

The only thing I knew about Fly then was that he was the founder and administrator of a closely-guarded Russian-language crime forum called thecc.bz (the “cc” part referring to credit cards). Fly also […]

2016-12-16T20:23:49-05:00June 24th, 2014|

ACLU Forces Reveal of How Stingray Cell Phone Tracking Works

Stingray cell phone tracker

Back in February, the ACLU filed a motion to unseal transcripts of a case where Tallahassee Police Department used the Stingray to track a cell phone to a suspect’s apartment. The judge recently unsealed the entire transcript. The part the sought to keep secret can be found [here]. The ACLU article makes it sound quite nefarious. Nothing too surprising. The transcript basically confirms what was understood or assumed to be the method of Stingray technology.

  • Stingrays “emulate a cellphone tower” and “force” cell phones to register their location and identifying information with the stingray instead of with real cell towers in the area.
  • Stingrays can track cell phones whenever the phones are turned on, not just when they are making or receiving calls.
  • Stingrays force cell phones in range to transmit information back “at full signal, consuming battery […]
2016-12-16T20:23:49-05:00June 9th, 2014|

Marines from Camp Lejeune train with local amateur radio operators for radio direction finding.

Searching for bugs or hidden transmitters requires radio direction finding techniques, usually deployed for TSCM in a small area such as a conference room or office environment. Similar techniques are used on a larger scale for such things as search and rescue, locating radio interference, as well as finding hidden transmitters. Ham radio clubs often have “fox hunts” to practice these direction finding techniques.

SALISBURY, NC (Salisbury Post) — In an emergency, being able to locate a lost person or find an enemy might save lives. U.S. Marines know this, and their training prepares them for a world of possibilities.

But there are some things classroom training can’t teach, which is why Sgt. Phillip Rice and 12 other Marines traveled from Camp Lejeune to Salisbury on Saturday. Rice said he tries to locate opportunities for hands-on training that will help members of his unit, the […]

2016-12-16T20:23:49-05:00June 8th, 2014|

Gadget alert: Compact audio amplifier to use as sound source for sweeps.

Gadget alert summary: inexpensive audio amp with built in micro SD mp3 player, works well as sound source for sweeps.

Monoprice 611700 portable amp/mp3 player.

I’m always trying to make improvements to our sweep techniques and to find ways make our operations more efficient. Finding a compact but strong sound source to use during RF sweeps that does not drive people nuts can be a challenge (for both the sweep team and the client). A number of fellow tscm-ers have mentioned playing recordings of things like a cleaning crew with a vacuum cleaner, other office sounds, or just music. The goal, though, is to have a playback device that is compact and fast and easy to set up.  I have seen guys take an iPod, mp3 player, or even their cell phone and connect it to a remote speaker. That can do ok, but it adds an […]

2016-12-16T20:23:51-05:00March 29th, 2014|

CES 2014: New gadgets = new spy gear… Consumer devices to help kids spy on mom and a programmable Mom to spy on everyone, MiniDrones, and a “Jumping Sumo”

It should be well known that consumer products often have other nefarious purposes (think baby monitors and tiny voice recorders). Watching what has been revealed at the International CES, (the major consumer electronics expo in Las Vegas) shows some neat high-tech toys that may be worth paying attention to, not necessarily due to any inherent any evil intent, but they show how some clever and formerly advanced technology is becoming less expensive and readily available to the public to do with as they will.

Spying on Mom: Tyche, by AIBrain, Inc.

This was described as “A $200 robot companion for kids that follows the voice command: ‘Go to the kitchen, find Mom, take a picture of her and return here.’ A cellphone provides processor, cameras, microphones, sensors.” It’s probably supposed to be fun, but what if mom doesn’t want […]

2016-12-16T20:23:55-05:00January 6th, 2014|

Virtual Reality, Real Spies- What else goes on in the world of online gaming?

New York Times, World; By MARK MAZZETTI and JUSTIN ELLIOTT (Dec 9, 2013)

Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.

Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels.

The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, […]

2016-12-16T20:23:55-05:00December 24th, 2013|

Tech execs urge Obama to limit NSA spying on their users

Washington Bureau, Dec 17, 2013

The nation’s top technology executives gave President Barack Obama an earful about the National Security Agency’s spying on their users at a White House meeting Tuesday.

The president met with 15 tech executives, including Apple CEO Tim Cook, FacebookChief Operating Officer Sheryl Sandbergand Google Executive Chairman Eric Schmidt.

Apple CEO Tim Cook

Obama talked to the executives about his administration’s work to fix HealthCare.gov, the federal insurance exchange, and announced he’s hired former Microsoft Office Division President Kurt DelBene to lead this effort. The president also encouraged the executives to share their ideas on how to improve the federal government’s procurement and use of information technology.

But NSA spying was clearly the most important topic for the tech executives.

They left the White House without talking to reporters, but they did issue the following joint statement: “We appreciated the opportunity to share directly with the president our principles on government surveillance that we released last […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Hidden camera and remote controlled power outlets- but no espionage, just an advertising stunt.

Intel and The Monkeys chase power in hidden camera stunt

Intel has enlisted creative agency The Monkeys to conduct a hidden camera experiment which sees people chasing around remote controlled power outlets as they try to charge their devices.

The video ‘Chasing Charge’ to promote the new Core Processors has people chasing the power outlet at a cafe until it hides in a box which reveals the message “power keep running out on you?”

 

Intel’s Asia Pacific director brand strategy and integrated marketing Jayant Murty said in a statement: “In a world where people want to stay connected to the things they love without breaks or interruptions, they are increasingly seeking devices that have great performance and amazing battery life.

“Until recently consumers have had to choose between the two. But not with the latest core processors, that give you both in one package.”

2013-12-05T19:25:02-05:00December 5th, 2013|

Types of people behind today’s corporate security threats

An article on ZDNet provides a good summary of who might be attacking your network, along with tips for fighting back.
Problems could easily come from any of the following:digital user+password1

Employees 
IT workers 
CEOs and small business owners 

State-sponsored actors 
Corporate espionage 
Wannabes and thrill seekers 
Software developers 

[Full Article] Field guide: Types of people behind today’s corporate security threats

…For an example of how serious corporate espionage can be, one need look no further than Nortel, the former telecommunications giant that declared bankruptcy in 2009. In 2012, The Wall Street Journal reported that hackers, who appeared to be working in China, used stolen passwords from Nortel executives to “downloaded technical papers, research-and-development reports, business plans, employee emails and other documents.” Brian Shields, a former 19-year Nortel employee and systems […]

2016-12-16T20:23:56-05:00December 2nd, 2013|

Report from Milipol 2013, Paris, France

Entrance to Milipol, Parc des Exposition, Paris, France Entrance to Milipol, Parc des Exposition, Paris, France

Milipol is an advanced expo for military, police, and security held every two years in Paris, France, and alternate years in Qatar. Encompassing arms, ammunition, protective equipment, electronics, optics, IT, uniforms, mobility and more for government, military and public security applications protecting the world’s people and property, Milipol Paris has become the premier expo of the latest technologies and defense capabilities. This year’s show expected over 27,000 visitors.

RF Jamming Vehicle RF Jamming Vehicle

Armored communications vehicle. Armored communications vehicle.

While much of the expo was dedicated to military and police, many of the products on display would be of interest to anyone involved […]

2016-12-16T20:23:56-05:00November 27th, 2013|

Spy shoes to drones: How U.S. surveillance changed

An article in USA Today reviews the history of spy-dom with an interactive graphic reviewing some devices and techniques from the 1940’s through 2013.  An important point to remember when considering all forms of technology today, is that the advancements have a cumulative effect, especially when it comes to spying. Techniques from the 1700’s, 1800’s, and 1900’s are still valid in 2013. Just because new technology has emerged does not mean that old technology or techniques have disappeared.  We now have Kindles and iPads, Youtube and podcasts, yet books, radio, and TV are still with us and very significant.  With much of today’s spying taking place in the cyber world, it’s important to remember that the old techniques have not gone away. Hidden microphones, transmitters, covert video, even putting your ear up to an air vent to hear voices from another room are still active valid eavesdropping threats […]

2016-12-16T20:23:57-05:00November 8th, 2013|

Spy: The Secret World of Espionage – exhibit opens at the Ronald Reagan Library in Simi Valley

The exhibition is on display at the Ronald Reagan Presidential Library in Simi Valley. It was put together through a collaboration between the CIA, FBI, the National Reconnaissance Office and the Foreign Excellent Trenchcoat Society, a Florida-based non-profit operated by author and collector Keith Melton.   www.reaganfoundation.org

Article By Gregory J. Wilcox, Los Angeles Daily News

The current flap about the NSA spying on U.S. allies and enemies alike shouldn’t be a big surprise to those familiar with the history of spycraft.

Governments have secretly been listening to and watching each other for decades and now an exhibit opening Wednesday at the Ronald Reagan Presidential Library in Simi Valley exposes the tricks of the spy trade.

Visitors to “SPY: The Secret World of Espionage,” will get a look at many devices and documents that had been kept secret for years. It’s the West Coast premiere of the traveling show so there […]

2013-10-31T20:15:51-04:00October 31st, 2013|

New project for Elon Musk: making James Bond submarine car work.

The Drum.com 19 OCTOBER 2013

Tech entrepreneur Elon Musk revealed as mystery buyer of James Bond submarine car – and now he plans to make it work

Elon Musk, the billionaire tech inventor who co-founded Paypal, has admitted that he was the mystery telephone bidder who bought James Bond’s submarine car from ‘The Spy Who Loved Me’ for £550,000 at auction in London last month.  (see our post https://execsecurity.com/?p=571 )

But more intriguingly, the 42-year-old SpaceX and Tesla Motors chief now says he plans to make the classic Lotus Espirit work underwater.

“It was amazing as a little kid in South Africa to watch James Bond in ‘The Spy Who Loved Me’ drive his Lotus Esprit off a pier, press a button and have it transform into a submarine underwater,” he said.

“I was disappointed to learn that it can’t actually transform. What I’m going to do is upgrade it […]

2016-12-16T20:23:57-05:00October 21st, 2013|

New audio technology could be an interesting way to pass secret messages…

Dr. Ivan Poupyrev is a Principle Research Scientist for Disney Research in Pittsburgh, Pennsylvania. Among other creative projects, he has developed a method for transferring audio through the human body by modulating an electric charge in the body.  The audio cannot be heard unless the charged up person touches someone’s ear (or other amplification device). His creation is called Ishin-Denshin, which is a Japanese expression for communicating through an unspoken medium.

Here is a description of Ishin-denshin from Dr. Poupyrev’s web site 

Ishin-Den-Shin: Transmitting Sound via Touch

This project explores the use of human body as an analogue sound transmission medium. Called “Ishin-Den-Shin,” a Japanese expression for communicating through an unspoken mutual understanding, i.e. non-verbal communication, the technology turns an audio message into an inaudible signal that is relayed by the human body. When the communicator’s finger slightly rubs an object, this physical interaction creates an ad hoc […]

2016-12-16T20:23:58-05:00October 2nd, 2013|
Go to Top