Profile cover photo
Profile photo
Kevin Murray
Electronic Surveillance Detection and Counterespionage Consulting for Business & Government
Electronic Surveillance Detection and Counterespionage Consulting for Business & Government
About
Posts

Post has attachment
FutureWatch - Microphone with an Ear and Brains, or how to stay ahead of the bad guys...
Clients know how quickly technology advances, and they occasionally ask... "Aren't you always one step behind the bad guys?"   I've heard some colleagues agree, and even mention it themselves as a pre-sweep hedge against failure, along with the idiotic stat...

Post has attachment
New Clickless Bluetooth Attack - Billions of Devices Vulnerable
Researchers have devised an attack that uses the wireless technology to hack a wide range of devices, including those running Android, Linux, and, until a patch became available in July, Windows. BlueBorne, as the researchers have dubbed their attack, is no...

Post has attachment
Cautionary Tale: Spycams in Schools
As the school season starts, unfortunately it's time to remind children to be alert for spycams. Unfortunately, this is a story which pops up at least once or twice per month. Different players, same teacher v. student scenario... Canada - A gymnastics coac...

Post has attachment
The Good News, Bad News VPN Joke
In January this year, China announced a 14-month campaign to crack down on VPNs in a bid to tighten online surveillance ahead of the 19th National Congress of the Communist Party of China which opens in October.... Unlike individual users, multinational fir...

Post has attachment
Apple Watch is Center of Sports Spying Scandal
For decades, spying on another team has been as much a part of baseball’s gamesmanship as brushback pitches and hard slides. The Boston Red Sox have apparently added a modern — and illicit — twist: They used an Apple Watch to gain an advantage against the Y...

Post has attachment
"So, we created a picture of our suspect from DNA sweat found on the bugging device."
Damn interesting.. . Identification of Individuals by Trait Prediction Using Whole-genome Sequencing Data Researchers from Human Longevity, Inc. (HLI) have published a study in which individual faces and other physical traits were predicted using whole geno...

Post has attachment
Wiretapping Gained Interest This Week... and why.
There was a big spike in wiretap searches this week... Here's why... Justice Department: No evidence Trump Tower was wiretapped

Post has attachment
Eavesdropping Boss Must Pay for Unjust Dismissal
A woman whose boss used to eavesdrop on her phone conversations with clients has won €10,000 in compensation after she was sacked illegally five years ago. An industrial tribunal heard how the firm’s managing director also installed monitoring software to s...

Post has attachment
These Companies Can Track Any Phone Anywhere
Tracking or tapping phones across the planet used to be a niche capability. Now, a myriad of for-profit spy companies sell border-crossing surveillance of mobile phones.   As soon as the target switches the phone on, it’s already too late. Digital spies hav...

Post has attachment
Spy Tech Talk - A Method to Detect a Wiretap Attack
...encryption and other forms of protection are important for fiber optic/copper communications, but there is also the need to consider physical protection for the infrastructure where those cable are installed. Many communication wires could be at risk of ...
Wait while more posts are being loaded