Comments

Chelloveck December 14, 2023 12:50 PM

Clothes hook? How quaint. The modern voyeur uses a camera that masquerades as a screwhead and can be surreptitiously mounted damn near anywhere. (Well, anywhere you have access behind whatever the “screw” is supposedly screwed into.) And it doesn’t get covered when someone actually hangs up their clothes!

Nameless Cow December 14, 2023 3:10 PM

@Bruce

This seems like a bad idea.

What exactly does “this” refer to in the sentence? (I can think of several reasonable possibilities.)

Winter December 14, 2023 3:25 PM

Here is a link to a real Amazon toilet spy camera

‘https://www.amazon.com/ZXWDDP-Security-Recorder-Detection-Needed-Black/dp/B0CC95SXXF/ref=mp_s_a_1_1

Clive Robinson December 14, 2023 3:45 PM

@ Bruce, ALL,

Re : The horse is long gone.

This kind of raised a “where have you been hiding for a decade” thought,

“Ms Martin argues: “Retailers do need to be doing more. They need to be stamping out hidden cameras because there are very few instances in which hiding the fact that you’re filming someone is applicable or acceptable.”

You’ve been able to buy very small cameras openly for over a decade and a half. Swann in Australia used to manufacture, and Maplin UK used to sell a colour camera and 2.5GHz transmitter combined in a cube about 1cm by 1cm by 1cm for less than the equivalent of 100USD.

I put several in my son’s Hornby model railway engines and guards vans to give a driver / guard eye view at the control station. You could turn them on/off using a spare output from the DCC chip more usualky used by modlers to turn carrage lights or similar on and off. Somewhere I’ve a silly video clip that we made with a christmas cake decoration of a rabbit or hare was jokingly called “Psycho-bunny” because the eyes had been painted in red and it looked kind of like that famous “red eyes” political poster of a certain well known UK politician. The movie clip was like those early silent black and white movies of a moustache twirling vilain with a maiden –played by another christmas cake decoration of a fairy– tied to the tracks… It was silly but quite funny.

The point is you could put those cameras in anything. Another made by Swann sold by Maplin UK item was a compleate camera, and DVR to in a 1cm by 1cm by 2cm metal case including a microphone. A later version had a flatter camera with a screwthread on the lens unit you could push through a button hole on a jacket or other item of clothing, and a selection of screw on buttons in black you could paint to match clothing. It’s DVR unit was on the end of a meter and a half cable and had a built in LCD screen with backwards/forwards fast/slow buttons and it recorded to a Miniture Menory Card (MMC) of the physical size commonly used in mobile phones.

You can now by DJI Drones with 4K HD colour cameras for well under 100GBP and stripping the camera, and 2.5 or 5Ghz transmitter with a line of sight range of 0.5km or more is something a home hobbyist can do with very little dificulty.

If you want to spend “silly money” then you can by a “baby monitor” at lots of stores that have such cameras and microphones built into a cuddly toy you can put in the cot or bedside or other place in the room. One is ironically in a “cuddly-bunny” mouth with Infra-Red LEDs in the eyes to give 10m of night vision. On chatting to some one I know who’s “other half” works as a buyer in a major London Retail outlet they put the price up to over 600GBP and they were still selling out… Mostly to thirtyish WMC “helicopter parent” type couples.

The point is “the genie was well and truely out of the bottle” a decade and a half ago on the availability and use of tiny CCTV cameras, quite a few with built in ISM band transmitters with quite a long distance range.

For those with evil intent using a razor blade to lift wall paper and a small chisel to dig a hole in the plaster and put in a CCTV camera with a very thin four wire interface then make a pin hole in the wall paper before using a “prit-stick” or similar glue is not difficult.

But also remember for atleast two decades you have been able to buy those combined microwave and passive IR burglar detector alarms with built in CCTV camera and microphone. Also overhead “smoke alarms” with camera and microphone, it takes about five minutes to take a cheap wall clock with large black numbers drill in a small hole in the 6 and put a miniture CCTV camera behind it with the microphone facing downwards which has an inbuilt 2.5Ghz transmitter. And hang it on a conferance room wall.

Likewise take one of those shelf box files for A4/ fullscap paper put in a drone or similar camera and a motorbike battery sized 128Wh LiPo-4 battery in it as well, it will sit there transmitting away for well over a week and in some cases more than two weeks.

Over the years on this blog I’ve indicated how you can find hidden cameras by the “red-eye” or “lamping” effect which is the principle those “cats-eyes” in the road use (ie 180degree intetnal reflection).

People need to learn how to do it and as I also point out learn how to use low cost “Software Defined Radios”(SDRs) as “spectrum displays” and receivers as “bug-sweepers”.

I’ve personal been involved with highly confidential business meetings where signals in the room have suddenly started transmitting and they have come from individuals in the meeting… putting devices “under the table” etc. Likewise using mobile phones on the table using the built in WiFi to send audio…

We are in times where the ability to “black bag job” in video/audio and other spying/surveillance equipment has never been smaller, less expensive, and oh so childishly simple to put in place.

Unless you want to live in a SCIF with armed guards on the door –shout out to Jeff Bezos– or randomly couch surf –Hi to Elon Musk– then you had better “get with the tech” of surveillance sweeps, window noise makers and drawn curtains in any area you want a little privacy…

As for “perverts and stalkers” anyone remember all the noise over Apple’s oh so easy to use tracking devices so you would not loose your lugage etc?

Well whilst Apple came up with a few after market ideas, their competitors such as Tile, Amazon and others still are a “stalkers friend”. So we know what little chance there is that this surveillance will be stopped by retail controls or punitive legislation.

JonKnowsNothing December 14, 2023 4:29 PM

@Clive, All

re: Security Camera in Las Vegas

I saw a demo of the security systems used by high roller casinos that showed a substantial use of tiny cameras eons ago. They were/are everywhere.

Of course the big overhead cameras work too, but more as a Eye In The Sky deterrent because people intending to do “bad things” will do “bad things”.

One of the places these were installed were in the hotel rooms of high rollers.

These rooms are for high rollers that come to the casinos to spend (at that time) $500k – $1M over a 2 week casino binge. The rooms and food were all comp.

Those cameras verified that only the right people were in the room at the right time. If there was a private game, the casino had taps on the action. If someone wandered into the wrong bathroom, the security was At The Door.

They didn’t show if they had tiny cameras in the low roller rooms. Today I would expect they are everywhere.

JonKnowsNothing December 14, 2023 4:47 PM

@Clive, All

re High Tech Cameras for Livestock

The Ag industry has two prongs for high tech camera and surveillance.

  • To challenge and prevent “animal activists” (of any sort) from gaining access to the property or animals or to set up a “protest” at the site. There are guns involved.
  • To monitor and prevent the rustling or theft of valued livestock.

Urban folks may not know that rustling and ag machine theft is some of the biggest issues in agricultural districts.

For Ag Equipment, the thieves just pull in a large enough trailer and load the equipment and drive off. For smaller equipment they come with a fork lift.

For livestock and expensive animals, they do the same thing. For cattle, they bring a mobile butcher van. Load up a bunch of cattle and butcher them before they hit the big city markets.

For horses, they are trailered and their grooming altered (shave mane) to another location for sale or even shipped overseas.

In a good number of barns and stables, every horse owner has their own stable-camera(s) to monitor their horse 24×7. They have audio links and can talk to the stable workers nearby.

RFID chips for horses and animals are quite common now. Trackers hidden in Ag Equipment are also common. Unfortunately the thieves often know where those trackers and chips are inserted.

William December 14, 2023 4:59 PM

I know there’s all sorts of devices that claim to find hidden cameras, but I think I’d prefer to travel with a sniffer dog trained to find electronic devices.

They’re far more user friendly and come with the added bonus of having a fool proof way of finding lost memory cards and key fobs!

‘https://www.startribune.com/minnesota-s-new-police-dog-can-help-sniff-out-evidence/572471481/

ResearcherZero December 15, 2023 1:38 AM

@Clive

Australia has a long tradition of spy shops, and a long history of some particularly Orwellian endeavors, such as national identification databases and ID, with surreptitious surveillance of media consumption activities and those that might display said materials.

Cultural policing, obviously for the “greater good” of protecting the masses from ‘foreign ideas’. Dynamite, bulldozers and firebombing are brutally effective at removing any trace of non-European practice or artifact, which might hint at other already existing culture.

Known as the “Irish Model” from its origins in suppressing dissent in the Irish colony in the 19th century, it set the police against the community, placed them in military style barracks, under a highly centralised and hierarchical chain of command.

Elsewhere, officers exercised often unfettered brutality in punitive frontier expeditions. This was in pursuit of pastoral land grabs, settler occupation and the disintegration of Aboriginal families. In general, they were not there to win hearts and minds.
https://theconversation.com/enforcing-assimilation-dismantling-aboriginal-families-a-history-of-police-violence-in-australia-140637

It is estimated that during the active period of the policy, between 1 in 10 and 1 in 3 Indigenous children were removed from their families and communities.

This was active policy during the period from the 1910s into the 1970s, and arguably still continues today under the banner of child protection.
https://australian.museum/learn/first-nations/stolen-generation/

Imperial Policing — Keeping the public under close observation for their own good.

While police reformers turned to organizational and cultural models from the imperial-military regime, they also imported tactical and operational innovations.

“I’ve studied military tactics and used them to good effect in rounding up crooks. After all we’re conducting a war, a war against the enemies of society and we must never forget that.”

Vollmer was here referring to the reform era as a whole, but he was also speaking of himself: most of his innovations came from his own experience in the imperial-military regime.
https://www.journals.uchicago.edu/doi/10.1086/708464

The term, derived from the Greek genos (“race,” “tribe,” or “nation”) and the Latin cide (“killing”)

Many advocates of removal, including President Jackson, rationalized the policy by paternalistically claiming they were “savages” and that removal would protect Indian communities from outside influences.

‘https://open.baypath.edu/his114/chapter/genocide-vs-forced-assimilation/

involuntary cultural assimilation

If a state puts extreme emphasis on a homogeneous national identity, it may resort, especially in the case of minorities originating from historical foes, to harsh, even extreme measures to ‘exterminate’ the minority culture, sometimes to the point of considering the only alternative its physical elimination (expulsion or even genocide).
https://en.wikipedia.org/wiki/Forced_assimilation

Winter December 15, 2023 2:07 AM

Here is the presentation at Usenix

Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment
‘https://www.usenix.org/conference/usenixsecurity22/presentation/sharma-rahul

Abstract

Hidden IoT devices are increasingly being used to snoop on users in hotel rooms or AirBnBs. We envision empowering users entering such unfamiliar environments to identify and locate (e.g., hidden camera behind plants) diverse hidden devices (e.g., cameras, microphones, speakers) using only their personal handhelds.

What makes this challenging is the limited network visibility and physical access that a user has in such unfamiliar environments, coupled with the lack of specialized equipment.

This paper presents Lumos, a system that runs on commodity user devices (e.g., phone, laptop) and enables users to identify and locate WiFi-connected hidden IoT devices and visualize their presence using an augmented reality interface. Lumos addresses key challenges in: (1) identifying diverse devices using only coarse-grained wireless layer features, without IP/DNS layer information and without knowledge of the WiFi channel assignments of the hidden devices; and (2) locating the identified IoT devices with respect to the user using only phone sensors and wireless signal strength measurements. We evaluated Lumos across 44 different IoT devices spanning various types, models, and brands across six different environments. Our results show that Lumos can identify hidden devices with 95% accuracy and locate them with a median error of 1.5m within 30 minutes in a two-bedroom, 1000 sq. ft. apartment.

ResearcherZero December 15, 2023 2:14 AM

Though that says very little about other techniques you might use to disguise cameras and microphones in such a manner that no one will notice. Large space I suppose, Strailya? Why get off your a*** when you can shove a camera up it.

ResearcherZero December 15, 2023 3:16 AM

@Winter

That might be very useful.

“The latest data delved deeper into the age when the abuse first occurred, and the perpetrators.”
https://www.abc.net.au/news/2023-11-22/australia-abs-figures-economic-financial-abuse-childhood/103133396

“We are just going to transfer your call. Please hold.”

‘Catastrophic failures’ – protecting reputations was/is the priority

‘https://www.theguardian.com/australia-news/2023/nov/18/victims-betrayal-victoria-school-child-sexual-abuse-inquiry

https://professionals.childhood.org.au/prosody/2021/09/child-abuse-remains-unseen-and-ignored/

62% (2 in 3 Australians) abused, neglected, or exposed to domestic violence as children

‘http://www.acms.au/wp-content/uploads/2023/06/3846.1_ACMS_A4Report_V2.1_Digital_20230627-1.pdf

None of the states or territories meet the minimum standards of the UN Convention on the Rights of a Child treaty.
https://www.abc.net.au/news/2023-07-27/corporal-punishment-australia-united-nations/102643940

They are all accomplished at the switchboard-shuffle between departments.

Clive Robinson December 15, 2023 9:53 AM

@ Winter, ResearcherZero, ALL,

Re: CCTV and other bug hunting.

“For finding cheap&simple spy IoT’s, help is on its way”

It will only find those devices that are,

1, Radiating WiFi at the time of the bug -sweep scan.
2, Radiating at a consistant level.
3, Where the antenna or other radiating part can be got close to by the user.
4, That do not use MAC randomization or similar meta-data changing.
5, Do not use “burst mode” or similar techniques to break up relationship between input and transmission.
6, Off Freguency / out of ISM / WiFi bands signal radiation.
7, Any form of “Low Probability of Intercept”(LPI) technique such as Spread Spectrum frequency/channel hopping etc.

As I’ve indicated at various times in the past.

For instance obviously a simple mains power timer switch system you can by on the high street for a few USD be setup so that the CCTV/Bug is not powered up for say two hours after the “guest” arives or only at certain times of the day (as used with security night-lights etc).

Also some WiFi devices can be put into a passive non TX mode by the receiving end of the link. So if the evesdropper/pervert sees a user moving around in a way that is indicative of “bug sweeping” they can turn the devices off for five or ten minutes then turn them on briefly to check etc.

It’s why I like Red-Eye detection systems because it detects the bug / CCTV devices input transducer by it’s physical characteristics not if it is operating / powered up. Thus if it’s there it will show up to an effective “bug sweep”. Oh and audio microphones of the “electret capsual” size and smaller often use “audio waveguide” which as it is a “feedline/transmission-line” will suffer from the “mismatched load reflection” issue not that disimilar to the “Red-Eye” effect. Like all transmission lines they are highly susceptable to being detected by a variation on “Time and Phase Domain Reflectomatry”(TDR)[1].

What I’ve pointed out in the past is that you can use a mobile phone camera and flashing IR-LED to do Red-Eye detection of focused optics very easily. Likewise writting an app to do acoustic TDR and FFT analyse the reflections is well within the capabilities of many App developers. Both will be more effective than in WiFi band RSSI and basic packet analysis techniques, because they “instrument the transducers” and other “Physical input” that has to be present for the bugs / surveillance devices to work even if they are not powered up.

Also as taught to all high school kids in Basic Science all work,

1, Requires Energy.
2, Is inefficient.
3, Waste energy becomes heat.
4, Heat energy not only radiates, it is also transported by conduction and convection.

So all active electronic devices even when in standby mode and not transmitting data are doing work and thus producing waste energy heat signitures different to the local environment they are in. Thus can if you know how to do it[2] be found using the likes of Thermal Imagers that are getting quite inexpensive these days.

Also if digital as most things are these days, they will have a “clock signal”. As has oft been noted “Even a rusty nail will radiate.” as will any wire carrying changing charge. Loops especially radiate more effectively with increasing area compared to a fraction of a wavelength due to the additive effect of the fields. A good book on “ElectroMagnetic Compatability”(EMC) will tell you most of what you need to know as will a number of very less expensive books from the US ARRL and UK RSGB and other nations Amateur Radio Societies, as it’s “reguired knowledge” under the licencing conditions of an individual[3] participating in the hobby.

[1] Simply you send out a very fast rising edge signal repetedly and look at the returned energy in time and phase domains using DSP techniques. Any waveguide will act as a “quater-wave resonator” or multiples there of at near harmonically related frequencies. So like blowing across the top of a bottle, or flute, it will unavoidably due to it’s intended purpose produce a reflection that betrays it’s pressence. I’ve talked about this in the past when discussing “Active TEMPEST/EmSec” techniques. Duncan Campbell the journalist that M15 and MET Special Branch tried to evesdrop on via a device they had put on his POTS landline that “jumped the hook switch”, discovered to their suprise that Duncan had developed a detection system that showed it’s and other wire tap devices presence on the “last mile” line by TDR. Typical to form MI5 stole the device and then having had Tony Sale and colleagues examin it then got a couple of UK telco manufactures to make them for the security services and other government Depts, without paying Duncan any of the royalties he was legaly due… When I chatted to Tony Sale about it “over a beer or two” at Bletchly, he guessed it would have been a fair sum of money, as other Five-Eye partners Australia and US in particular apparently purchased quite a lot of them.

[2] You can do it by “hot / cold transition” timing. Put simply all materials have different thermal characteristics especially in conduction and radiation. Thus if you have say a screw in a plaster wall and you cycle the rooms temprature the time delay difference will cause the screw to show up as a local difference to the plaster. Likewise holes etc. However whilst passive objects will show a consistant time lag from hot to cold as cold to hot as you switch back and forth, active devices have an asymmetric time response, as you would expect after a little thought about those high school basic science lessons.

[3] Technically the licencing conditions for RT&TTE systems come down from the United Nations via the “International Telecommunications Union”(ITU) agency into national legislation.

There are three basic types of licencing,

1, The system on a site.
2, The technical personnel on a site.
3, The specific equipment and it’s manufacturing process.

It’s unlawful to opperate radio equipment unless one or more of these licences are in place, unless you can play the “National Security Exemption” card (kind of like waterboarding it ain’t tourture if it’s a government sponsored person doing it).

Winter December 15, 2023 10:22 AM

@Clive

As I’ve indicated at various times in the past.

As I wrote, this is for cheap&simple spy IoT’s. Anything more advanced will require more advanced detection techniques. But it is a start.

lurker December 15, 2023 3:25 PM

@Winter, Clive

I have on my android phone a “Network Analyser” from the app store, which identifies devices connected to each visible network, shows signal strength and frequency in use. In a recent visit to an Airbnb I noted the dishwasher, fridge, a couple of light dimmers, plus a few other unidentified devices. Is the MAC device makers’ index still any use these days?

William December 15, 2023 6:16 PM

@ZeroResearch, Interesting insights. Never knew the word “the Irish Model’, but it makes sense. I’ve always associated the mechanism with Industrialization when they forced the folk off the land and into the factories by outlawing their way of life; literally in some cases, such as make it a capital offense to trap a rabbit.

@Clive and Winter, what is your take on detection sweeps which identify the lens of spy cameras? Are they too small these days to be detected?

I think it makes a good case for a dog trained to sniff out triphenylphosphine oxide. Or maybe rats, they might be easier to scale for the IoT, not to mention a good metaphor, rats sniffing out the rats.

Clive Robinson December 16, 2023 2:58 AM

@ William,

“[W]hat is your take on detection sweeps which identify the lens of spy cameras?”

Firstly sweeps only work in or very close to the optics “field of view” which in some respects makes the search quite a bit easier…

Because CCTV is not used randomly and high quality optics are expensive, it is either used broad-view from a distance to get general coverage, or close-view from close-in to a point of interest. Thus your sweep is minimised to picking one or two spots and not even doing a 3D-360 sweep as mounting/concealment points are usually easily spotted by an experienced eye.

Further the “Find one you know it’s not alone” principle usually applies. Because CCTV is so very inexpensive these days the use of cameras in any area tends to be over the top thus multiple. Which means your probability of finding any one of them goes up significantly.

But with regards,

” Are they too small these days to be detected?”

Ask yourself the question,

“How small is a single piece of glitter that can be seen glinting from across the room?”

The answer supprisingly is one heck of a lot smaller than the normal resolving power of your eye which is about 1:2000 or 0.5mm^2 at 1m distance. It’s like the visability of celestial objects lit by stars, or the eyes of preditors/game “down to the objects albedo”. Like stelth-tech it’s made worse due to the curved surface of the objects. Think if you want a comparison to a 1970’s Disco Mirror Ball, it realy does not matter where you stand, as long as it’s in “line of sight” it will reflect your sweep beam back on that 180 return path that Red-Eye / lamping works so well on. Think how small a fox or rabbit iris opening is 50m or more across a field at night, likewise the “cats-eyes” road markers your car headlight makes visable 200m or more away.

With regards,

“I think it makes a good case for a dog trained to sniff out triphenylphosphine oxide.”

I don’t for a couple of reasons.

Firstly as for the heat disipating “Printed Circuit Board”(PCB) coating “triphenylphosphine oxide”(TPPO). Detecting it by sniffer dog is actually of less and less use these days. Because of not just the rise in IoT device usage but the significant rise of general “Fast Moving Consumer Electronics”(FMCE). For instance LED lights, and clothes irons use it, as do effectively all “white and brown” goods even those you would have thought unlikely such as nose hair trimmers, hair curlers and other grooming products and similar even the battery based tools in our tool box and gizzmo electronic wine bottle openers and electric carving knives we apparently steadily fill our homes with courtesy of Amazon and Co. They are all based around the same electronic components that “memmory cards” are, and for the same reason TPPO is used thus appearing in all “Fast Moving Consumer Electronics”(FMCE) pretty much as standard these days.

But secondly I actually hate the use of sniffer dogs/animals… Few know that they are effectively tortured not just in training but their entire working life by being on what is euphemistically called “The Reward Diet”. Basically you continuously stave the dog, and then only feed it morsels when it finds what you want it to find tgus it’s hunger enslaves… Worse the animals are undernourished with life expectancy and general well being of the animals verifiably diminished. Certainly not my idea of a “Working relationship” or “Symbiotic partnership” between “Man and beast” that many claim. It’s also why training other sniffer animals is not very successful with the exception of perhaps drug sniffing where the reward just as it is with junkies is a chemically altered state. So remember that starved or turned into an addict sniffer animals are in an “abuse-dependancy” relationship with the handler. What punishment do we hand out to those who do similar to children and other vulnerable people?

ResearcherZero December 22, 2023 2:24 AM

“At the end of the day, I don’t think [facial recognition] is going to do a damn thing to keep the public safe.”

https://www.washingtonpost.com/travel/2023/12/20/clear-facial-recognition-technology-airport-security/

“The trackLocation method showcases the potential for extracting data that can be used for location tracking.”

Request, response and filtering. The Geolocation API returns location coordinates globally, based on the input of an IP Address or Wi-Fi Access point MAC address.

‘https://wingu.se/2023/11/30/only-apple-can-do-allow-apps-tracking-users-location-without-consensus.html

This can reveal a detailed profile of someone’s daily habits. Where they shop, where they live, and what places they frequent at certain times could be laid bare by this data.
https://www.pcworld.com/article/402799/free-wi-fi-hotspots-can-track-your-location-even-when-you-arent-connected.html

‘https://www.reuters.com/technology/an-abused-wife-took-tesla-over-tracking-tech-she-lost-2023-12-19/

“But the proliferation of cameras powered by advanced AI software (like facial recognition) isn’t limited to baseball. These advanced cameras are increasingly monitoring our every move, in stadiums and on the street. When we aren’t on camera, we are traced by our cell phones. And even at home, most of our communications – whether over a cell phone or computer – pass through countless intermediaries that view, package, and sell our information. […] Increasingly, judges are willing to sign off on warrants, turning over our data even when police have no reason to believe we have done anything wrong.”

All this data, collected and stored, is almost always unprotected and accessible by law enforcement without showing any valid reason for needing it.
https://www.stopspying.org/latest-news/2023/6/15/when-you-cant-trust-the-judge-by-david-siffert-and-julie-lee

Leave a comment

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.