Former U.S. Army intelligence analyst Korbein Schultz was sentenced this week to 84 months in prison for selling classified military information to an individual connected to the Chinese government. (see https://www.justice.gov/opa/pr/former-us-army-intelligence-analyst-sentenced-selling-sensitive-military-information) Betrayal for Financial Gain Schultz, a 25-year-old from Wills Point, Texas, pleaded guilty to conspiring to collect and transmit national defense information, unlawfully exporting controlled information to China, and accepting approximately $42,000 in bribes in exchange for sensitive U.S. government information. Attorney General Pamela Bondi emphasized the severity of…
Category: Uncategorized
Chinese Espionage Campaign Targets UK Officials with Park Bench Bugs and Mobile Surveillance
Chinese Intelligence Deploys Sophisticated Environmental Surveillance Across Westminster In a troubling escalation of foreign intelligence activity, Chinese operatives have reportedly planted surveillance devices throughout central London's government district, including in park benches, bushes, and even inside Whitehall buildings, according to security sources. Authorities have issued warnings to senior officials in Westminster to avoid known "hotspots" in the SW1 area where there is suspected high concentration of Chinese intelligence gathering. These hotspots include not only government buildings but also pubs, luxury…
Bastille’s Bluetooth Device Detection Advantage
As wireless technologies proliferate, Bluetooth devices have become ubiquitous in environments ranging from personal spaces to highly secure corporate facilities. While Bluetooth devices provide convenience and connectivity, they also introduce significant security risks. In secure environments like data centers, malicious actors can exploit Bluetooth vulnerabilities to infiltrate networks, exfiltrate data, or disrupt operations. It is crucial to detect and mitigate these risks immediately. Bastille Networks stands apart from other solutions by offering comprehensive and advanced Bluetooth detection capabilities. This document…
When Bluetooth Gets Loose: The Crosswalk Hack Heard ‘Round Palo Alto
Bluetooth (both Classic and Low Energy) was supposed to make life easier. Devices like wireless headphones, smart thermostats, and fridges that talk to your phone (despite your wishes to the contrary) are meant to make life easier. But what happens when Bluetooth gets a little too friendly, like letting anyone walk up to a city crosswalk and making it sound like Elon Musk is having a midlife crisis? Welcome to Palo Alto, where the future meets the intersection, and the…
Google Quickshare Wireless Malicious Payload Exploit
Last week, researchers disclosed two new vulnerabilities in Google’s Quick Share utility, re-enabling an RCE chain that allows attackers to wirelessly deliver malware to victim devices. SafeBreach Labs recently disclosed critical security bypasses in Quick Share, highlighting vulnerabilities capable of achieving RCE on Windows devices and forcing permanent Wi-Fi hotspot connections to attacker-controlled networks. These exploits allow attacking devices to deliver malicious payloads silently without prior Quick Share approval. Quick Share, Google's peer-to-peer data-transfer utility for Android, Windows, and Chrome…
Securing Mergers & Acquisitions with Bastille
Mergers and Acquisitions (M&A) require the utmost confidentiality and security due to the high volume of sensitive information exchanged, the involvement of multiple stakeholders, and the potential risks associated with integrating new systems. Wireless threats, often overlooked, can jeopardize the integrity of these transactions. Bastille’s advanced wireless threat detection provides comprehensive protection at every stage of the M&A process. The following brief outlines how Bastille safeguards critical aspects of M&A activities. The Challenge: Wireless Threats in M&A Activities Wireless communication…
Maximizing Your SCIF Security with Advanced WIDS Technology
Secured Compartmented Information Facilities (SCIFs) are the bedrock of national security, serving as sanctuaries where authorized personnel handle the most sensitive and classified information. Ensuring the integrity and security of these facilities is paramount for U.S. Federal Government agencies, particularly within the Department of Defense (DoD). As the landscape of wireless threats evolves, traditional security measures within SCIFs need augmentation from cutting-edge technology. Wireless Intrusion Detection Systems (WIDS) have proven indispensable in augmenting SCIF security. Understanding the Importance of SCIF…
Preventing Smartphone-Enabled Data Breaches: Lessons from the Jian Zhao Case
The recent case of U.S. Army Sergeant Jian Zhao highlights the growing risk of smartphone-enabled data breaches and the urgent need for advanced wireless security measures. According to the U.S. Department of Justice, Zhao allegedly photographed classified military documents using his smartphone and transmitted sensitive data to unauthorized contacts overseas. While at Joint Base Lewis-McChord, Zhao reportedly used encrypted messaging platforms to communicate and share sensitive national defense information with unauthorized personnel, significantly endangering national security. Zhao’s Smartphone Espionage According…
Wireless CVEs explode in 2024
Wireless communication has become the backbone of modern connectivity, but its ubiquity brings an ever-growing set of vulnerabilities. The latest data highlights an alarming trend: the number of wireless-related Common Vulnerabilities and Exposures (CVEs) continues to increase annually. The chart below shows that the cumulative count of wireless-related CVEs has skyrocketed since tracking began in 1998. A staggering 716 new wireless CVEs appeared in 2024 alone, accounting for 20% of all wireless-related CVEs recorded over the past 27 years. That…
How I Air-Fried My Phone Back To Life
I’ve been using a Samsung Galaxy S21 Ultra for the past three years, and up until yesterday, it had served me well. But then, I woke up to a frustrating surprise—despite being plugged in all night, my phone was stuck at 12% battery. Even worse, a message on the screen read: "Charging halted because battery temperature is too low for safe charging." That was odd because my phone wasn't cold—it was around 70°F (21°C). I unplugged and replugged it, switched…