Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Spying on spies: Chapman shops, contacts ‘handler’

WASHINGTON (AP) — Unaware the FBI has her under surveillance, Russian spy Anna Chapman buys leggings and tries on hats at a Macy’s department store. A few months later, cameras watch her in a New York coffee shop where she meets with someone she thinks is her Russian handler. It is really an undercover FBI agent.

Tapes, documents and photos released Monday describe and sometimes show how Chapman, now a celebrity back in Russia, and other members of a ring of sleeper spies passed instructions, information and cash. The ring was shut down in June 2010 after a decade-long counterintelligence probe that led to the biggest spy swap since the Cold War.

The FBI released the material to The Associated Press in response to a Freedom of Information Act request. The investigation was code-named “Ghost Stories,” the release of documents on Halloween a coincidence.

While the deep-cover agents did not steal any secrets, an FBI counterintelligence official told the AP they were making progress.

Read More


Magazine alleges CIA spies on enemies, friends

Central Intelligence Agency Director David Petraeus testifies before a Joint Intelligence Committee hearing in Washington

BERLIN, Oct. 24 (UPI) — U.S. spies have been spying on their counterparts in East Germany and West Germany, recently released documents indicate.

The CIA was expected to monitor East German spies during the Cold War, but U.S. documents indicated Americans were spying on their allies in West Germany’s Bundesnachrichtendienst as well, The Local reported Monday.

The German magazine Focus said documents indicated office alliances, personal peccadilloes and health information were noted.

The spying continued into the 1990s, even after the fall of communism, with BND agents with a Nazi past drawing attention, the magazine reported.

Focus said the documents indicated telephone calls with Germany’s domestic intelligence and security authority were tapped, as were conversations with other security services in Paris and London.

BND said they weren’t surprised by the news they were being spied on by the CIA.

A former BND counterintelligence expert told Focus he and colleagues often thought such clandestine operations were undertaken.

“The cat does not let the mouse free,” the former spy said when asked if he thought the CIA were still spying on the BND.


Smithwick hears about bugging investigation

A retired Garda inspector has described investigations into the alleged interception of cross-border telephone calls between the RUC and GardaĂ­ by the IRA, leading to the murder of two senior RUC officers.

Retired inspector Chris Kelly was asked to carry out an investigation in 2009 following an article that appeared in the Phoenix magazine, claiming that the IRA had a bug the organisation used to intercept phone calls between Dundalk garda station and the RUC over secure lines.

Read More


Lawyers to face jail for bugging leaks

Lawyers who are made privy to the identity of police phone bugging and surveillance targets will face up to two years’ jail if they disclose the information, the Victorian government says.

The minister responsible for the establishment of an anti-corruption commission, Andrew McIntosh, has released the legislation setting up public interest monitors (PIMs).

The PIM, and his or her deputies, will attend court and tribunal hearings where police or Office of Police Integrity (OPI) representatives apply for permission to tap someone’s phone or track them using surveillance devices.

They will also appear at warrant applications made by the yet to be established Independent Broadbased Anti-Corruption Commission.

The draft law follows Ombudsman George Brouwer’s finding earlier this month that there was an accountability gap regarding telephone intercepts in Victoria.

He recommended the government develop measures to allow the merit of telecommunication intercepts to be assessed.

Mr McIntosh told the parliament the PIMs would be lawyers who would have to act independently and not be employed by the commonwealth, the state or the Office of Public Prosecutions.

They would attend application hearings in the courts where they would have the right to question warrant applicants and have access to a copy of the application and any affidavit.

If a PIM disclosed the sensitive information to others they would face two years’ jail.

Mr McIntosh said last year alone Victoria Police and the OPI made 424 applications for telecommunications interception warrants and all had been granted.

It was a similar situation with surveillance device warrants.

“Covert investigation and coercive powers, such as surveillance devices (and) telecommunications interceptions … are among the most intrusive powers available to integrity and law enforcement bodies in Victoria,” he said.

“Strong accountability measures should exist for the use of such significant powers.”

The legislation will be debated in the lower house next month.


App Turns iPhone into spiPhone

Used to be if spies wanted to eavesdrop, they planted a bug. These days, it’s much easier. Because we all carry potential bugs in our pockets—smartphones. One team of researchers used an iPhone to track typing on a nearby computer keyboard with up to 80 percent accuracy. They presented the findings at a computer security conference in Chicago. [Philip Marquardt et al., (sp)iPhone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers, 18th ACM Conference on Computer and Communications Security]

The researchers designed a malicious app for the iPhone 4. When you place the phone near a keyboard, it exploits accelerometer and gyroscope data to sense vibrations as the victim types—detecting whether keystrokes come from the left or right side of the keyboard, and how near or far subsequent keys are from each other. Then, using that seismic fingerprint, the app checks a pre-created “vibrational” dictionary for the most likely words—a technique that works reliably on words of three letters or more.

Of course, you’d need to install the app to allow it to spy. But whereas most apps have to ask permission to access location data or the camera, that’s not so for the accelerometer. This kind of attack may offer good reason to limit accelerometer access too—and keep iPhones from becoming “spiPhones.”

—Christopher Intagliata