<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:georss="http://www.georss.org/georss" xmlns:media="http://search.yahoo.com/mrss/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Spying Gear and Security Related Articles</title>
	<atom:link href="https://spygadgets4sale.wordpress.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://spygadgets4sale.wordpress.com</link>
	<description>This Blog is dedicated to providing information on spying gear, surveillance gear and security related topics.</description>
	<lastBuildDate>Tue, 23 Sep 2025 14:27:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<cloud domain="spygadgets4sale.wordpress.com" path="/?rsscloud=notify" port="80" protocol="http-post" registerProcedure=""/>
<image>
		<url>https://secure.gravatar.com/blavatar/06b535360cd5a9696c78824f52647374442aed81c8f0fac8a68a0aeca8e97d5b?s=96&amp;d=https%3A%2F%2Fs0.wp.com%2Fi%2Fbuttonw-com.png</url>
		<title>SpyGadgets4Sale Spy Gear &amp; Surveillance Gear</title>
		<link>https://spygadgets4sale.wordpress.com</link>
	</image>
	<atom:link href="https://spygadgets4sale.wordpress.com/osd.xml" rel="search" title="SpyGadgets4Sale Spy Gear &amp; Surveillance Gear" type="application/opensearchdescription+xml"/>
	<atom:link href="https://spygadgets4sale.wordpress.com/?pushpress=hub" rel="hub"/>
	<item>
		<title>Space Cryptography</title>
		<link>https://spygadgets4sale.wordpress.com/2025/09/23/space-cryptography/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/09/23/space-cryptography/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 14:27:53 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Space Satellite Intelligence]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1209</guid>

					<description><![CDATA[On September 18,&#160;Viasat, Inc.&#160;announced that it is developing a new space-based encryption solution to support data security for U.S. Space Force (USSF) Space Systems Command (SSC). Under this multi-year development award, Viasat’s encryption team within its Defense and Advanced Technologies segment will build a next-generation cryptography solution for satellite applications allowing the government to better [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>On September 18,&nbsp;<a href="http://www.viasat.com/" target="_blank" rel="noreferrer noopener">Viasat, Inc.</a>&nbsp;announced that it is developing a new space-based encryption solution to support data security for U.S. Space Force (USSF) Space Systems Command (SSC). Under this multi-year development award, Viasat’s encryption team within its Defense and Advanced Technologies segment will build a next-generation cryptography solution for satellite applications allowing the government to better protect critical space assets from cybersecurity threats.</p>



<p>Selected for the program during its 2024 fiscal year, Viasat will develop an end-to-end encryption solution to secure sensitive data from space-to-ground. This will include the development of space-qualified encryption hardware and leverage Viasat’s certified terrestrial encryption equipment for the ground system test terminal.</p>



<p>Viasat’s space-to-ground encryption solution will deliver an End Cryptographic Unit (ECU) designed with prelaunch and on-orbit functionality to quickly address various communications and transmission security requirements, optimizing size, weight and power. Viasat’s space ECU development builds on a long history providing secure communications solutions for the government and complements a terrestrial portfolio of proven edge-to-cloud, tactical and embedded high assurance encryption products.</p>



<p>Compared to traditional solutions, Viasat will develop and produce a high speed, multi-channel, certified Ground Operating Equipment (GOE) for use in testing future communications payloads and terminals. As part of this effort, the GOE will be enhanced to support the demands of unique key and algorithm requirements that add resiliency. Viasat cryptographic solutions also deliver a flexible, multi- function design that supports multiple security functions via ground and space devices.</p>



<p>“Viasat is proud to partner with the U.S. Space Force on modern crypto solutions to address current and evolving threat environments,” said David Schmolke, vice president of mission connections and cybersecurity, Viasat Government. “We are committed to supporting future capabilities of integrated space-crypto solutions to ensure that mission critical data and satellite access controls are protected. This contract award further solidifies Viasat’s position as a trusted partner providing highly secure, resilient space-based communications solutions to a broad range of applications.”</p>



<p>Source: Viasat</p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/09/23/space-cryptography/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>
	</item>
		<item>
		<title>AI App to Assist Reporting Suspicious Activity</title>
		<link>https://spygadgets4sale.wordpress.com/2025/09/15/ai-app-to-assist-reporting-suspicious-activity/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/09/15/ai-app-to-assist-reporting-suspicious-activity/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Mon, 15 Sep 2025 21:11:47 +0000</pubDate>
				<category><![CDATA[General Information]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1206</guid>

					<description><![CDATA[Ohio Homeland Security unveils new AI suspicious activity reporting system by: Kasey Sheridan Posted:&#160;Sep 12, 2025 / 02:12 PM EDT Updated:&#160;Sep 12, 2025 / 01:15 PM EDT SHARE COLUMBUS, Ohio (WKBN) — Ohio&#160;Homeland&#160;Security&#160;(OHS) announced the launch of a new suspicious activity reporting system that uses artificial intelligence to gather information on potential threats of violence. Developed [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Ohio Homeland Security unveils new AI suspicious activity reporting system</p>



<p>by: Kasey Sheridan</p>



<p>Posted:&nbsp;Sep 12, 2025 / 02:12 PM EDT</p>



<p>Updated:&nbsp;Sep 12, 2025 / 01:15 PM EDT</p>



<p>SHARE<a href="https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.wytv.com%2Fnews%2Flocal-news%2Fohio-homeland-security-unveils-new-ai-suspicious-activity-reporting-system%2F&amp;picture=https%3A%2F%2Fwww.wytv.com%2Fwp-content%2Fuploads%2Fsites%2F77%2F2025%2F09%2Fai-generic.jpeg%3Fw%3D900&amp;title=Ohio%20Homeland%20Security%20unveils%20new%20AI%20suspicious%20activity%20reporting%20system&amp;description=Ohio%20Homeland%20Security%20%28OHS%29%20announced%20the%20launch%20of%20a%20new%20suspicious%20activity%20reporting%20system%20that%20uses%20artificial%20intelligence%20to%20gather%20actionable%20information%20on%20potential%20threats%20of%20violence." target="_blank" rel="noreferrer noopener"></a><a href="https://twitter.com/intent/tweet?text=Ohio%20Homeland%20Security%20unveils%20new%20AI%20suspicious%20activity%20reporting%20system&amp;url=https%3A%2F%2Fwww.wytv.com%2Fnews%2Flocal-news%2Fohio-homeland-security-unveils-new-ai-suspicious-activity-reporting-system%2F" target="_blank" rel="noreferrer noopener"></a><a href="https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fwww.wytv.com%2Fnews%2Flocal-news%2Fohio-homeland-security-unveils-new-ai-suspicious-activity-reporting-system%2F&amp;title=Ohio%20Homeland%20Security%20unveils%20new%20AI%20suspicious%20activity%20reporting%20system" target="_blank" rel="noreferrer noopener"></a><a href="mailto:?subject=Ohio%20Homeland%20Security%20unveils%20new%20AI%20suspicious%20activity%20reporting%20system&amp;body=From%20WYTV%0A%0A%0A%0Ahttps%3A%2F%2Fwww.wytv.com%2Fnews%2Flocal-news%2Fohio-homeland-security-unveils-new-ai-suspicious-activity-reporting-system%2F" target="_blank" rel="noreferrer noopener"></a></p>



<p>COLUMBUS, Ohio (WKBN) — Ohio&nbsp;Homeland&nbsp;Security&nbsp;(OHS) announced the launch of a new suspicious activity reporting system that uses artificial intelligence to gather information on potential threats of violence.</p>



<p>Developed by OHS and its private partner Vigiliti, the Safeguard Ohio app uses AI to encourage users to provide as much information as possible to help law enforcement investigate suspicious activity.</p>



<p>Users can use the app to submit photo, video and audio of incidents and remain anonymous.</p>



<p>The submitted information is reported in real-time to the Statewide Terrorism Analysis and Crime Center. Analysts review the content and report it to the appropriate authorities.</p>



<p>The new Safeguard Ohio replaces OHS’s current online reporting method, which requires people to fill out a form.</p>



<p>“Events that threaten the safety of Ohioans can be hard to predict, but they can be prevented with help from timely, detailed tips from the public,” said Governor Mike DeWine. “This new app simplifies the process to get information to law enforcement quickly and conveniently.”</p>



<p>“One of the best attributes of this new system is the ability to upload video and photos,” said Andy Wilson, director of the Ohio Department of Public Safety. “More and more people these days — especially our younger generation — don’t like to talk on the phone. This new reporting method will result in more detailed information being shared with the authorities. That’s exactly what we want. Better information leads to better investigations.”</p>



<p>The app is not a replacement for calling 911. In the event of an emergency, the app will prompt users to call 911 instead.</p>



<p>“The AI-infused prompts are essential components of this new system,” said Mark Porter, OHS executive director. “We will get the high-quality intelligence we need to act on a tip through this new system. The AI is trained to keep asking questions until the person reporting says they have no more information about the incident.”</p>



<p>Safeguard Ohio can take reports in 10 different languages besides English: Arabic, Chinese, French, German, Haitian, Hindi, Nepalese, Somali, Spanish and Yiddish.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/09/15/ai-app-to-assist-reporting-suspicious-activity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>
	</item>
		<item>
		<title>North Korea’s next potential Leader</title>
		<link>https://spygadgets4sale.wordpress.com/2025/09/15/north-koreas-next-potential-leader/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/09/15/north-koreas-next-potential-leader/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Mon, 15 Sep 2025 21:05:00 +0000</pubDate>
				<category><![CDATA[General Information]]></category>
		<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[intellengence]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[politics]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[world events]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1199</guid>

					<description><![CDATA[Her age and maybe her name are mysteries, but this girl could be North Korea&#8217;s next leader By Associated Press 2:04pm Sep 12, 2025 Likely in her early teens and bearing a close resemblance to her mother, the daughter of&#160;North Korean&#160;leader&#160;Kim Jong Un&#160;is increasingly viewed as his likely heir. The&#160;girl, believed to be named Kim [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading">Her age and maybe her name are mysteries, but this girl could be North Korea&#8217;s next leader</h1>





<p><a href="https://www.9news.com.au/meet-the-team/contributors/associated-press">By Associated Press</a></p>



<p>2:04pm Sep 12, 2025</p>



<p>Likely in her early teens and bearing a close resemblance to her mother, the daughter of&nbsp;<a href="https://www.9news.com.au/north-korea">North Korean</a>&nbsp;leader&nbsp;<a href="https://www.9news.com.au/kim-jong-un">Kim Jong Un</a>&nbsp;is increasingly viewed as his likely heir.</p>



<p>The&nbsp;<a href="https://www.9news.com.au/world/kim-jong-un-daughter-north-korea-leader-beijing-china/f6aa77d7-427b-4fb5-8c80-7ba56447d5c0">girl, believed to be named Kim Ju Ae</a>, was in the spotlight again as she accompanied her father on his high-profile China trip, his own first visit to a major gathering of world leaders and her first known trip abroad.</p>



<p>Video and images carried by North Korean state media showed her right behind her father and ahead of Foreign Minister Choe Son Hui as they got off a train in Beijing, clapping as officials at the North Korean Embassy in Beijing bowed to her father, and standing near him as he was seated with senior officials in a meeting room inside his train.</p>



<figure class="wp-block-image"><img src="https://imageresizer.static9.net.au/6vP8Cvx9TxCpTA22S7oixx-qFBs=/0x124:4490x2650/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2F60a94b2b-6b1b-40e4-92b9-2fece654ef7b" alt="In this photo provided by the North Korean government, North Korean leader Kim Jong Un and his daughter arrive at the East Pyongyang Grand Theatre in Pyongyang, North Korea, June 29, 2025." /><figcaption class="wp-element-caption">Likely in her early teens and bearing a close resemblance to her mother, the daughter of North Korea leader Kim Jong Un is increasingly viewed as his likely heir.&nbsp;(AP)</figcaption></figure>



<p>South Korea’s spy agency said on September 11 that it assesses that the trip solidified her status as her father’s likely heir.</p>



<p>She is believed to be 12 or 13 years old. Not much else is known about her, but her repeated appearances at high-profile events with her father have prompted speculation that she’s being groomed as North Korea’s next leader.</p>



<h3 class="wp-block-heading"><strong>China trip analysed intensively</strong></h3>



<p>In a closed-door briefing for politicians, the South Korean National Intelligence Service said Kim Jong Un was believed to have brought his daughter to China to help her acquire overseas experience and cement her status as his likely heir, according to Park Sunwon, who attended the meeting.</p>



<p>The spy agency cited coverage of her appearances in China in the country&#8217;s main state TV station and newspaper, which target the ordinary citizens, according to lawmaker Lee Seong Kweun, who was also present at the meeting.</p>



<figure class="wp-block-image"><img src="https://imageresizer.static9.net.au/LDqR2HbClBcyU2BVINORa5u9zZ0=/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2F852e1ac1-9803-4a30-b902-a88bc2eef8a9" alt="In this photo provided by the North Korean government, its leader Kim Jong Un, center, and his daughter attend a launch ceremony of a destroyer named Kang Kon at the Rajin shipyard in Rason, North Korea, Thursday, June 12, 2025." /><figcaption class="wp-element-caption">North Korean state media outlets have never published her name, referring to her as Kim Jong Un&#8217;s “respected” or “most beloved” child.&nbsp;(AP)</figcaption></figure>



<h3 class="wp-block-heading"><strong>Her name and age are unconfirmed</strong></h3>



<p>North Korean state media outlets have never published her name, referring to her as Kim Jong Un&#8217;s “respected” or “most beloved” child.</p>



<p>The belief that she is named Ju Ae is based on an account by former NBA champion Dennis Rodman, in which he recalled holding Kim Jong Un’s baby daughter during a trip to Pyongyang in 2013.</p>



<p>Her exact age is unconfirmed but South Korean intelligence officials believe she was born in 2013.</p>



<p>In 2023, South Korea&#8217;s spy agency told politicians it assessed Kim Jong Un and his wife Ri Sol Ju also have an older son and a younger third child whose gender is unknown.</p>



<figure class="wp-block-image"><img src="https://imageresizer.static9.net.au/N8bL6MioQX5Pa4qu8PZqFji4zt4=/0x251:5000x3063/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2F36d585a6-6965-457c-817c-3478644c73eb" alt="In this photo provided by the North Korean government, North Korean leader Kim Jong Un, center right, and his daughter attend a completion and operation ceremony of Kangdong Greenhouse Farm in Pyongyang, North Korea, March 15, 2024. " /><figcaption class="wp-element-caption">Her exact age is unconfirmed but South Korean intelligence officials believe she was born in 2013.&nbsp;(AP)</figcaption></figure>



<h3 class="wp-block-heading"><strong>She’s being increasingly showcased in her father’s events</strong></h3>



<p>Kim Jong Un allowed his daughter to be seen in public for the first time during a test launch of an intercontinental ballistic missile in November 2022.</p>



<p>Photos in state media showed Kim Ju Ae wearing a white coat and red shoes as she watched a soaring missile from a distance and walked hand-in-hand with her father.</p>



<p>Her carefully crafted appearances have included missile tests, military parades, and the launch of a naval destroyer in April.</p>



<p>Kim Jong Un has recently expanded his daughter’s public appearances beyond military events to include some of his most ambitious economic projects and cultural events, including the opening of a beach resort in June.</p>



<figure class="wp-block-image"><img src="https://imageresizer.static9.net.au/GikJ99p8kdhPqTErBmlsMaW0zOQ=/0x276:2964x1943/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2Fd4876560-9e73-4043-9c5c-a85289bc7833" alt="In this photo provided by the North Korean government, its leader Kim Jong Un's daughter talks to him on the day of a launching ceremony for a new naval destroyer at a western port in Nampo, North Korea, Friday, April 25, 2025. " /><figcaption class="wp-element-caption">Her carefully crafted appearances have included missile tests, military parades, and the launch of a naval destroyer in April.&nbsp;(AP)</figcaption></figure>



<h3 class="wp-block-heading"><strong>Some question her chances to take over a male-dominated system</strong></h3>



<p>South Korea’s National Intelligence Service issued a careful assessment last year that it views Kim Ju Ae as her father’s likely successor, citing a comprehensive analysis of her public activities and the state protocols provided to her.</p>



<p>However, some outside experts disagree with that assessment, citing Kim Jong Un’s relatively young age and the extremely male-dominated nature of North Korea’s power hierarchy.</p>



<p>In its recent briefing at parliament, the National Intelligence Service assessed that Kim has no major health issues and that he conducted official schedules in China smoothly.</p>



<p>Since its foundation in 1948, North Korea has been successively ruled by male members of the Kim family — Kim&#8217;s father, Kim Jong Il, and grandfather, Kim Il Sung.</p>



<p>Kim Jong Un inherited power in late 2011 upon his father&#8217;s death.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/09/15/north-koreas-next-potential-leader/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://imageresizer.static9.net.au/6vP8Cvx9TxCpTA22S7oixx-qFBs=/0x124:4490x2650/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2F60a94b2b-6b1b-40e4-92b9-2fece654ef7b">
			<media:title type="html">In this photo provided by the North Korean government, North Korean leader Kim Jong Un and his daughter arrive at the East Pyongyang Grand Theatre in Pyongyang, North Korea, June 29, 2025.</media:title>
		</media:content>

		<media:content medium="image" url="https://imageresizer.static9.net.au/LDqR2HbClBcyU2BVINORa5u9zZ0=/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2F852e1ac1-9803-4a30-b902-a88bc2eef8a9">
			<media:title type="html">In this photo provided by the North Korean government, its leader Kim Jong Un, center, and his daughter attend a launch ceremony of a destroyer named Kang Kon at the Rajin shipyard in Rason, North Korea, Thursday, June 12, 2025.</media:title>
		</media:content>

		<media:content medium="image" url="https://imageresizer.static9.net.au/N8bL6MioQX5Pa4qu8PZqFji4zt4=/0x251:5000x3063/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2F36d585a6-6965-457c-817c-3478644c73eb">
			<media:title type="html">In this photo provided by the North Korean government, North Korean leader Kim Jong Un, center right, and his daughter attend a completion and operation ceremony of Kangdong Greenhouse Farm in Pyongyang, North Korea, March 15, 2024. </media:title>
		</media:content>

		<media:content medium="image" url="https://imageresizer.static9.net.au/GikJ99p8kdhPqTErBmlsMaW0zOQ=/0x276:2964x1943/500x0/https%3A%2F%2Fprod.static9.net.au%2Ffs%2Fd4876560-9e73-4043-9c5c-a85289bc7833">
			<media:title type="html">In this photo provided by the North Korean government, its leader Kim Jong Un's daughter talks to him on the day of a launching ceremony for a new naval destroyer at a western port in Nampo, North Korea, Friday, April 25, 2025. </media:title>
		</media:content>
	</item>
		<item>
		<title>CIA Mole Hunter Extraordinaire – Passes Age 80</title>
		<link>https://spygadgets4sale.wordpress.com/2025/07/29/cia-mole-hunter-extraordinaire-passes-age-80/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/07/29/cia-mole-hunter-extraordinaire-passes-age-80/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Tue, 29 Jul 2025 18:11:23 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Spy Articles]]></category>
		<category><![CDATA[Spy Catcher]]></category>
		<category><![CDATA[Spy History]]></category>
		<category><![CDATA[Surveillance]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1194</guid>

					<description><![CDATA[The woman who tracked down a CIA mole By Tara McKelvey BBC News Magazine Sandra Grimes knew that one of her colleagues was a traitor &#8211; one of the biggest in US history, as it turned out. She helped put him in prison for the rest of his life. Her story is now told in [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading" id="main-heading">The woman who tracked down a CIA mole</h1>



<ul class="wp-block-list">
<li>Published 8 January 2014</li>
</ul>



<figure class="wp-block-image"><img src="https://ichef.bbci.co.uk/ace/standard/624/mcs/media/images/72162000/jpg/_72162118_51503136.jpg" alt="Aldrich Ames in front of a courthouse" /><figcaption class="wp-element-caption">Image caption,Aldrich Ames at a federal courthouse in Virginia in February 1994</figcaption></figure>



<p>By Tara McKelvey</p>



<p>BBC News Magazine</p>



<p><strong>Sandra Grimes knew that one of her colleagues was a traitor &#8211; one of the biggest in US history, as it turned out. She helped put him in prison for the rest of his life. Her story is now told in a TV miniseries.</strong></p>



<p>Aldrich Ames liked to explain things. Once he told Sandra Grimes how to catch a mole.</p>



<p>&#8220;He gave this &#8216;counterintelligence 101&#8217; talk,&#8221; she says. &#8220;Was I mad? Yes. But I didn&#8217;t want to show anything.&#8221;</p>



<p>She and her colleague, Jeanne Vertefeuille, were trying to find out why the agency was losing its Soviet assets, individuals who had agreed to betray their own country and work for the CIA.</p>



<p>At the time Ames was being watched.</p>



<p>&#8220;There was already deep suspicion,&#8221; says Henry Crumpton, a former CIA operative. &#8220;That was part of Sandy&#8217;s job &#8211; not to spook him. She was masterful.&#8221;</p>



<p>The story of how she and Vertefeuille helped to catch Ames is explored in a mini-series, The Assets, that began on the US network ABC last Thursday.</p>



<p>The show is based on a 2012 book, Circle of Treason, by Grimes and Vertefeuille. The main characters in the mini-series are played by British actors &#8211; Paul Rhys (Ames), Jodie Whittaker (Grimes) and Harriet Walter (Vertefeuille).</p>



<p>Grimes, 68, talks about the CIA while sitting in a La-Z-Boy-style chair in front of an electric fireplace at her house in northern Virginia. Costco Connection, a magazine published by a discount retailer, is lying on a shelf.</p>



<p>The room smells of apricot, wafting from a fragrance bottle, and is a far cry from the world of subterfuge and espionage, at least the kind portrayed in fiction. The reality is different.</p>



<p>Grimes and those who work for the CIA know things that can start wars and lead to people&#8217;s deaths. Yet the individuals themselves &#8211; or most of them &#8211; lead ordinary lives. That comes across in The Assets.</p>



<figure class="wp-block-image"><img src="https://ichef.bbci.co.uk/ace/standard/464/mcs/media/images/72162000/jpg/_72162202_photocourtesyofsandragrimes-singleone.jpg" alt="Sandra Grimes" /><figcaption class="wp-element-caption">Image caption,Grimes&#8217; book about a mole hunt has been made into an ABC mini-series</figcaption></figure>



<p>A former case officer, Joe Weisberg, creator and executive producer of&nbsp;<a href="http://vod.fxnetworks.com/watch/theamericans">The Americans,&nbsp;external</a>&nbsp;on FX network, says: &#8220;The characters were very recognisable from the CIA that I worked at. They seemed like real bureaucrats.&#8221;</p>



<p>CIA spokesman Christopher White says they avoid discussions about these kinds of programmes. &#8220;We don&#8217;t endorse &#8211; one way or the other,&#8221; he says.</p>



<p>Yet he is enthusiastic about Grimes herself &#8211; and the others who investigated Ames. &#8220;Today, roughly 20 years after the arrest, the Agency and the American people remain forever in their debt,&#8221; says White.</p>



<p>Like other bureaucrats, Grimes and Ames carpooled. They were working in the Soviet/East European operations division in the 1970s. He drove a Volvo &#8211; the window on the passenger side was stiff, she recalls, and hard to roll up.</p>



<p>&#8220;He couldn&#8217;t care less about how he looked,&#8221; she says. &#8220;He&#8217;d come running out of the house with his shirt not tucked in.&#8221;</p>



<p>He was a bureaucrat but saw himself as an intellectual, someone who read books about Russian history. &#8220;He loved the &#8216;what if&#8217; questions,&#8221; she says.</p>



<p>Later he carried out a shocking crime, handing over the names of Soviet assets to the KGB.</p>



<p>Randall Woods, the author of a biography of former CIA director William Colby, says of Ames: &#8220;His betrayal was indefensible. He wasn&#8217;t selling manuals or antiballistic missiles. He was betraying individuals.&#8221;</p>



<p>At least eight were executed. In exchange Ames received millions in cash.</p>



<figure class="wp-block-image"><img src="https://ichef.bbci.co.uk/ace/standard/464/mcs/media/images/72162000/jpg/_72162204_51607725.jpg" alt="Maria del Rosario Casas Ames next to a car" /><figcaption class="wp-element-caption">Image caption,Maria del Rosario Casas Ames, pictured outside court in 1994, had expensive taste</figcaption></figure>



<p>Ames was allowed to remain at the agency for nearly a decade after he initially betrayed the informants. CIA officers say they were able to protect their Soviet assets after that early period &#8211; when the informants were first exposed &#8211; and keep them safe.</p>



<p>CIA officers are touchy about the investigation &#8211; and defend their approach. They say they had to be rigorous in their efforts and needed time in order to pursue leads. Still the idea that Ames remained at the agency &#8211; and was close to those who kept the nation&#8217;s secrets &#8211; is unnerving.</p>



<p>Ames&#8217; first marriage ended in divorce. His second wife, Maria del Rosario Casas Ames, is from Bogota, Colombia.</p>



<p>&#8220;Rosario loves to spend money,&#8221; says Grimes. &#8220;Stores like Neiman Marcus, Nordstrom. Rick can&#8217;t keep up with it.&#8221;</p>



<p>Even he had a hard time explaining what happened.</p>



<p>&#8220;It was as if I were in almost a state of shock,&#8221; he said, according to a 1994 congressional&nbsp;<a href="http://www.fas.org/irp/congress/1994_rpt/ssci_ames.htm">report,&nbsp;external</a>. &#8220;The realisation of what I had done. But certainly underlying it was the conviction that there was as much money as I could ever use &#8211; if I chose to do that.&#8221;</p>



<p>The Soviets who agreed to spy on their own nation were aware of the risks. Ames believed that since they had consented to play such a high-stakes game, they could not be overly surprised if things ended badly.</p>



<p>Grimes says: &#8220;He rationalised it. It was, well, they knew when they signed up. This is it, babe.'&#8221;</p>



<p>She throws up her hands. &#8220;The arrogance starts to show,&#8221; she says. &#8220;It&#8217;s, &#8216;I&#8217;m smarter than you are.'&#8221; She says the words in a sing-song voice, imitating her former colleague, with a bright, superior look on her face.</p>



<p>The investigation took years. &#8220;It was very important that we didn&#8217;t get it wrong,&#8221; she says.</p>



<p>She and her colleagues pored over Ames&#8217; calendar and studied his bank statements. They worked together, sitting in cubicles with &#8220;huge, high&#8221; dividers, and passed information over the walls.</p>



<figure class="wp-block-image"><img src="https://ichef.bbci.co.uk/ace/standard/464/mcs/media/images/72162000/jpg/_72162312_image.jpg" alt="Mole hunters Grimes (left), Paul Redmond, Vertefeuille, Diana Worthen, Dan Payne" /><figcaption class="wp-element-caption">Image caption,Mole hunters Grimes (left), Paul Redmond, Vertefeuille, Diana Worthen, Dan Payne</figcaption></figure>



<p>They noticed Ames had been having lunch with an arms-control expert from the Soviet embassy. Afterwards Ames would go to the bank and deposit money.</p>



<p>She went to see one of her higher-ups at the agency: &#8220;I closed the door and said, &#8216;it doesn&#8217;t take a rocket scientist to figure out what is going on here. Rick is a goddamned Soviet spy.'&#8221;</p>



<p>Ames was arrested on 21 February 1994. &#8220;He was surprised,&#8221; she says. &#8220;He thought he got away with it.&#8221;</p>



<p>Still he did get away with it &#8211; for nine years. Grimes was methodical, yet overall the approach was flawed. &#8220;She did hard, painstaking work,&#8221; says Tim Weiner, author of Legacy of Ashes: The History of the CIA. &#8220;But the modality of CIA counterintelligence was to spin out theories.&#8221;</p>



<p>Frederick Hitz, who later served as the agency&#8217;s inspector general, wrote a report. &#8220;We asked, &#8216;What&#8217;s the story here? How did it happen?'&#8221; he says. &#8220;Our conclusion was that we did not feel the agency devoted sufficient resources to finding out why.&#8221;</p>



<p>The report remains classified.</p>



<p>The story of Ames shows the damage one man can do when given access to classified information and decides to use it to his own advantage. It also exposes the difficulty of ferreting out a traitor within an organisation as insular as the CIA.</p>



<p>Ames was sentenced to life in prison. The last time Grimes saw him was in a federal court in Alexandria, Virginia.</p>



<p>&#8220;I heard this noise,&#8221; she says. &#8220;It was a clank.&#8221;</p>



<p>Wearing leg irons, he appeared before the judge. &#8220;He pontificated and said, &#8216;blah, blah blah,'&#8221; she says.</p>



<p>&#8220;The magistrate said, &#8216;Mr Ames, yours is a crime against every citizen.&#8217; He took his gavel &#8211; boom. &#8216;Bail denied.&#8217; Whoa!&#8221;</p>



<p>She leans back and looks surprised.</p>



<p>Ames was escorted out of the room. &#8220;He was not a beaten man,&#8221; she says. &#8220;He was still in charge. That&#8217;s what he gave off. He&#8217;s comfortable with himself, oddly enough.&#8221;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/07/29/cia-mole-hunter-extraordinaire-passes-age-80/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://ichef.bbci.co.uk/ace/standard/624/mcs/media/images/72162000/jpg/_72162118_51503136.jpg">
			<media:title type="html">Aldrich Ames in front of a courthouse</media:title>
		</media:content>

		<media:content medium="image" url="https://ichef.bbci.co.uk/ace/standard/464/mcs/media/images/72162000/jpg/_72162202_photocourtesyofsandragrimes-singleone.jpg">
			<media:title type="html">Sandra Grimes</media:title>
		</media:content>

		<media:content medium="image" url="https://ichef.bbci.co.uk/ace/standard/464/mcs/media/images/72162000/jpg/_72162204_51607725.jpg">
			<media:title type="html">Maria del Rosario Casas Ames next to a car</media:title>
		</media:content>

		<media:content medium="image" url="https://ichef.bbci.co.uk/ace/standard/464/mcs/media/images/72162000/jpg/_72162312_image.jpg">
			<media:title type="html">Mole hunters Grimes (left), Paul Redmond, Vertefeuille, Diana Worthen, Dan Payne</media:title>
		</media:content>
	</item>
		<item>
		<title>Massive Brower Hijack Alert Post</title>
		<link>https://spygadgets4sale.wordpress.com/2025/07/15/massive-brower-hijack-alert-post/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/07/15/massive-brower-hijack-alert-post/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 15:06:27 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1188</guid>

					<description><![CDATA[Massive browser hijack: extensions turn Trojan and infect 2.3M Chrome and Edge users Last updated: 14 July 2025 Eighteen extensions had a “squeaky clean” codebase, sometimes for years, until a version bump turned them into dangerous trojans without any user input. Security researchers warn that over 2.3 million users have just been compromised, but there [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading has-text-align-center" id="massive-browser-hijack-extensions-turn-trojan-and-infect-2-3m-chrome-and-edge-users">Massive browser hijack: extensions turn Trojan and infect 2.3M Chrome and Edge users</h1>



<p>Last updated: 14 July 2025<a href="https://cybernews.com/security/chrome-edge-hijacked-by-eighteen-malicious-extensions/#comments-reply"></a></p>



<ul class="wp-block-list">
<li><img width="40" height="40" src="https://media.cybernews.com/2023/07/Ernestas-Naprys.jpg" alt="Ernestas Naprys"><a href="https://cybernews.com/author/ernestasnaprys/">Ernestas Naprys</a>Senior Journalist</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<figure class="wp-block-image"><img src="https://media.cybernews.com/images/featured-big/2025/07/chrome-edge.jpg" alt="Chrome, Edge" /><figcaption class="wp-element-caption">Image by Cybernews.</figcaption></figure>



<p><strong><em>Eighteen extensions had a “squeaky clean” codebase, sometimes for years, until a version bump turned them into dangerous trojans without any user input. Security researchers warn that over 2.3 million users have just been compromised, but there are many more extensions lurking.</em></strong></p>



<p>Key takeaways:</p>



<ul class="wp-block-list">
<li>In Chrome and Edge, 18 harmful browser extensions were identified as redirecting users to malicious sites and hijacking data.</li>



<li>The extensions accumulated hundreds of reviews and more than 2.3 million users before receiving malicious updates, according to Koi Security.</li>



<li>Users are urged to delete the malicious extensions and reset compromised credentials.</li>
</ul>



<p>Before turning malicious, one of the extensions had a Google verified badge, over 800 reviews, and a featured placement on the Chrome Web Store.</p>



<p>Koi Security researchers warn that the “Color Picker, Eyedropper – Geco colorpick” extension is one of the eighteen that were recently updated to include dangerous code.</p>



<p>“This is a carefully crafted Trojan horse that delivers exactly what it promises (a functional color picker) while simultaneously hijacking your browser, tracking every website you visit, and maintaining a persistent command and control backdoor,” the researchers said.</p>



<p>The sophisticated campaign, dubbed RedDirection, has infected over 2.3 million users across Chrome and Edge, making it one of the largest browser hijacking operations.</p>



<figure class="wp-block-image"><img src="https://media.cybernews.com/2025/07/colour-picker.jpg" alt="malicious-extension-example" /></figure>



<p>None of the 18 extensions were malicious from day one. They were popular productivity or entertainment tools, such as emoji keyboards, weather forecasts, video speed controllers, volume boosters, YouTube blockers, dark themes, etc.</p>



<p><strong>Refer to Full Article:</strong></p>



<p><a href="https://cybernews.com/security/chrome-edge-hijacked-by-eighteen-malicious-extensions/">https://cybernews.com/security/chrome-edge-hijacked-by-eighteen-malicious-extensions/</a></p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/07/15/massive-brower-hijack-alert-post/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://media.cybernews.com/2023/07/Ernestas-Naprys.jpg">
			<media:title type="html">Ernestas Naprys</media:title>
		</media:content>

		<media:content medium="image" url="https://media.cybernews.com/images/featured-big/2025/07/chrome-edge.jpg">
			<media:title type="html">Chrome, Edge</media:title>
		</media:content>

		<media:content medium="image" url="https://media.cybernews.com/2025/07/colour-picker.jpg">
			<media:title type="html">malicious-extension-example</media:title>
		</media:content>
	</item>
		<item>
		<title>China Navy Building More Yuan-Class Submarines</title>
		<link>https://spygadgets4sale.wordpress.com/2025/07/03/china-navy-building-more-yuan-class-submarines/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/07/03/china-navy-building-more-yuan-class-submarines/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 15:00:24 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[china]]></category>
		<category><![CDATA[Cold War]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1185</guid>

					<description><![CDATA[Exposed Undersea: PLA Navy Officer Reflections on China’s Not-So-Silent&#160;Service By Ryan D. Martinson While much of the international attention on China’s naval buildup is focused on its rapidly modernizing surface fleet, the People’s Liberation Army Navy (PLAN) is also taking bold steps to field a first-rate submarine force. By the end of this year, the [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading has-text-align-center"><a href="https://stationhypo.com/2025/07/01/exposed-undersea-pla-navy-officer-reflections-on-chinas-not-so-silent-service/">Exposed Undersea: PLA Navy Officer Reflections on China’s Not-So-Silent&nbsp;Service</a></h2>



<figure class="wp-block-image"><img src="https://stationhypo.com/wp-content/uploads/2025/07/sub.png?w=672" alt="" /></figure>



<p>By Ryan D. Martinson</p>



<p>While much of the international attention on China’s naval buildup is focused on its rapidly modernizing surface fleet, the People’s Liberation Army Navy (PLAN) is also taking bold steps to field a first-rate submarine force. By the end of this year, the service could have as many as 25 Yuan-class submarines, which are among the world’s most advanced diesel-electric boats. Its small-but-growing fleet of nuclear-powered attack (SSN), guided missile (SSGN), and ballistic missile (SSBN) submarines has achieved major technological upgrades, and with the benefit of a massive production facility in Huludao, may be on the cusp of significant expansion.</p>



<p>The PLAN is investing in submarines because it recognizes their tremendous potential deterrent and warfighting value. That value, however, hinges on the ability of their boats to operate undetected. According to Chinese military experts however, that basic requirement cannot be guaranteed—not even close. Writing in the November 2023 issue of Military Art (军事学术), a prestigious journal published by the Chinese Academy of Military Science, three PLAN officers revealed that the peacetime operations of Chinese submarines are highly vulnerable to the U.S. Navy’s undersea surveillance system, raising serious questions about their strategic and operational utility.</p>



<p>Entitled “Effectively Responding to the Threat to China’s Undersea Space Posed by the Powerful Enemy’s Three-Dimensional Surveillance System,” the article deserves special attention for two main reasons. First, while not an official assessment as might appear in a “white paper” or a “five-year plan,” it reflects the opinions of PLAN experts whose views are informed by access to classified intelligence and subject to peer review. The first author, Senior Captain Zhang Ning (张宁), is a faculty member at the Naval University of Engineering, College of Weapons Engineering. He co-authored the piece with Commander Zhang Tongjian (张同剑), from the 3rd Destroyer Flotilla (Unit 91257), and Lieutenant Fan Zhaopeng (范赵鹏) of the PLAN Oceanographic and Meteorological Center (Unit 91001). Second, the publication in which the article appears—Military Art—is an internal PLA journal (军内刊物). This enables the authors to share their expertise with a candor that is rarely (if ever) seen in publicly-available PLA sources.</p>



<p></p>



<figure class="wp-block-embed is-type-wp-embed is-provider-station-hypo wp-block-embed-station-hypo"><div class="wp-block-embed__wrapper">
<blockquote class="wp-embedded-content" data-secret="HvMctvbZeD"><a href="https://stationhypo.com/2025/07/01/exposed-undersea-pla-navy-officer-reflections-on-chinas-not-so-silent-service/">Exposed Undersea: PLA Navy Officer Reflections on China’s Not-So-Silent&nbsp;Service</a></blockquote><iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Exposed Undersea: PLA Navy Officer Reflections on China’s Not-So-Silent&nbsp;Service&#8221; &#8212; Station HYPO" src="https://stationhypo.com/2025/07/01/exposed-undersea-pla-navy-officer-reflections-on-chinas-not-so-silent-service/embed/#?secret=MmXfiXBGki#?secret=HvMctvbZeD" data-secret="HvMctvbZeD" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe>
</div></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/07/03/china-navy-building-more-yuan-class-submarines/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://stationhypo.com/wp-content/uploads/2025/07/sub.png?w=672"/>
	</item>
		<item>
		<title>The Secret War of the Women in the OSS</title>
		<link>https://spygadgets4sale.wordpress.com/2025/06/16/1179/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/06/16/1179/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Mon, 16 Jun 2025 14:45:01 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[OSS]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[WWII]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1179</guid>

					<description><![CDATA[Propaganda Girls: This Week at SPY A Conversation with author Lisa Rogak Tuesday, June 17 &#124; 6:30 PM ET &#124; FREE! Registration required. One of the most covert and successful military campaigns of WWII was also bloodless—the sole aim was to break the morale of Axis soldiers. Betty MacDonald was a 28-year-old reporter from Hawaii. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><em><strong>Propaganda Girls: </strong></em></td></tr><tr><td><strong>This Week at SPY</strong> <br><br><img data-attachment-id="1181" data-permalink="https://spygadgets4sale.wordpress.com/2025/06/16/1179/06_16_eblast_propaganda_girls_wac/" data-orig-file="https://spygadgets4sale.wordpress.com/wp-content/uploads/2025/06/06_16_eblast_propaganda_girls_wac.jpg" data-orig-size="1417,625" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="06_16_Eblast_propaganda_girls_WAC" data-image-description="" data-image-caption="" data-medium-file="https://spygadgets4sale.wordpress.com/wp-content/uploads/2025/06/06_16_eblast_propaganda_girls_wac.jpg?w=300" data-large-file="https://spygadgets4sale.wordpress.com/wp-content/uploads/2025/06/06_16_eblast_propaganda_girls_wac.jpg?w=600" class="wp-image-1181" style="width: 150px" src="https://spygadgets4sale.wordpress.com/wp-content/uploads/2025/06/06_16_eblast_propaganda_girls_wac.jpg" alt=""><br><strong><br>A Conversation with author Lisa Rogak</strong> <strong><em>Tuesday, June 17 | 6:30 PM ET | FREE! Registration required.</em></strong> One of the most covert and successful military campaigns of WWII was also bloodless—the sole aim was to break the morale of Axis soldiers.<br><br>Betty MacDonald was a 28-year-old reporter from Hawaii. Zuzka Lauwers grew up in a tiny Czechoslovakian village and knew five languages by the time she was 21. Jane Smith-Hutton was the wife of a naval attaché living in Tokyo. Marlene Dietrich, the German-American actress and singer, was of course one of the biggest stars of the 20th century.<br><br>In her new book, <em><a href="https://go.spymuseum.org/e/969033/1--psq-propaganda--ss-e--v-1-0/3rydfl/3634803752/h/kgIMNTl7E6X1_BSn0SAtRTHCl6UZLRCl1rOcUYS6o0A">Propaganda Girls: The Secret War of the Women in the OSS</a></em>, best-selling author <strong>Lisa Rogak</strong> tells the incredible true story of four unsung heroes, four women who spun the web of deception that helped win World War II. Join Rogak this evening as she sheds light on how these members of the United States Office of Strategic Services created a secret brand of propaganda that changed the course of history. &nbsp; &nbsp; <strong><a href="https://go.spymuseum.org/e/969033/ontent-propaganda-girls-button/3rydfp/3634803752/h/kgIMNTl7E6X1_BSn0SAtRTHCl6UZLRCl1rOcUYS6o0A">Register Now</a></strong> &nbsp; &nbsp;</td></tr></tbody></table></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/06/16/1179/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://spygadgets4sale.wordpress.com/wp-content/uploads/2025/06/06_16_eblast_propaganda_girls_wac.jpg"/>
	</item>
		<item>
		<title>UK military uncovers Russian spy sensors tracking nuclear submarines</title>
		<link>https://spygadgets4sale.wordpress.com/2025/04/08/uk-military-uncovers-russian-spy-sensors-tracking-nuclear-submarines/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/04/08/uk-military-uncovers-russian-spy-sensors-tracking-nuclear-submarines/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 15:06:53 +0000</pubDate>
				<category><![CDATA[General Information]]></category>
		<category><![CDATA[Surveillance]]></category>
		<category><![CDATA[Spy Devices]]></category>
		<category><![CDATA[Spy Tracking Sensors]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1173</guid>

					<description><![CDATA[&#8216;War raging in the Atlantic&#8217;: Russian spy sensors found near UK shores, raising security concerns&#8217; The British military identified the devices after several washed ashore and were located by the Royal Navy, according to a report One of Britain’s Vanguard nuclear submarines, HMS Vigilant, at a naval base in Scotland. AFP File Russian sensors suspected [&#8230;]]]></description>
										<content:encoded><![CDATA[
<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#8216;War raging in the Atlantic&#8217;: Russian spy sensors found near UK shores, raising security concerns&#8217;</strong></p>
</blockquote>



<h2 class="wp-block-heading">The British military identified the devices after several washed ashore and were located by the Royal Navy, according to a report</h2>



<p><img src="https://images.firstpost.com/uploads/2025/04/UKsubs1200-2025-04-758a4a4e8f774e0e1db6ebfc6a775725.jpg?im=FitAndFill=(596,336)" alt="'War raging in the Atlantic': Russian spy sensors found near UK shores, raising security concerns"></p>



<p>One of Britain’s Vanguard nuclear submarines, HMS Vigilant, at a naval base in Scotland. AFP File</p>



<p>Russian sensors suspected of attempting to spy on British nuclear submarines have reportedly been discovered hidden in the waters around the UK, raising potential national security threat.</p>



<p>According to&nbsp;<em>The Telegraph</em>&nbsp;report, the British military identified the devices after several washed ashore and were located by the Royal Navy.</p>



<p>The situation, which has not been previously made public, but&nbsp;<em>The Sunday Times</em>&nbsp;reported that Moscow is seeking to gather intelligence on the UK’s four Vanguard submarines, which are armed with nuclear missiles.</p>



<p>At least one of these submarines is currently deployed as part of Britain’s continuous at-sea deterrent.</p>



<p>Moscow possesses a fleet of specialised submarines that are believed to be better equipped than those of Britain and its Nato allies for seabed warfare and espionage.</p>



<p>During the ongoing conflict in Ukraine, Russia has intensified its surveillance and sabotage of underwater internet connections, energy pipelines, and military cables critical to the West.</p>



<p>In the past 15 months, at least 11 internet cables in the Baltic Sea have been damaged, partly due to ships dragging anchors across the seabed.</p>



<p>“You really need to keep the (engine) power on to drag, so it is a deliberate act,”&nbsp;<em>The Telegraph</em>&nbsp;quoted a defence insider as saying.</p>



<p>Nordic Warden, an AI-driven reaction system designed to monitor the movements of the Russian shadow fleet, was activated by the UK-led Joint Expeditionary Force following the damage to a cable between Estonia and Finland in December.</p>



<p>“There should be no doubt, there is a war raging in the Atlantic. This is a game of cat and mouse that has continued since the ending of the Cold War, and is now heating up again. We are seeing phenomenal amounts of Russian activity,”&nbsp;<em>The Telegraph</em>&nbsp;quoted a senior serving British military figure as saying.</p>



<p>Russia’s spy ship Yantar drew attention when it approached UK shores last year, and its underwater research programme is primarily managed by the Main Directorate for Deep-Sea Research (Gugi).</p>



<p>A senior UK source compared the situation to the space race.</p>



<p>“This is a world clouded in secrecy and subterfuge, it’s very hard to get absolute clarity. But there’s enough smoke to suggest something is on fire somewhere,”&nbsp;<em>The Telegraph</em>&nbsp;quoted him as saying.</p>



<p>Another official emphasised the need for a more assertive approach.</p>



<p>“We’ve got to play by the rules of the game. But whereas before we were playing it nicely, now we’re being more muscular,&#8221; the official was quoted as saying.</p>



<p>An MoD spokesman highlighted the commitment to securing critical offshore infrastructure.</p>



<p>“Alongside our Nato and Joint Expeditionary Force allies, we are strengthening our response to ensure that Russian ships and aircraft cannot operate in secrecy near the UK or near Nato territory, harnessing new technologies like AI and coordinating patrols with our allies.</p>



<p>“And our continuous-at-sea nuclear deterrent continues to patrol the world’s oceans undetected as it has done for 56 years,”&nbsp;<em>The Telegraph</em>&nbsp;quoted the spokesman as saying.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/04/08/uk-military-uncovers-russian-spy-sensors-tracking-nuclear-submarines/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://images.firstpost.com/uploads/2025/04/UKsubs1200-2025-04-758a4a4e8f774e0e1db6ebfc6a775725.jpg?im=FitAndFill=(596,336)">
			<media:title type="html">'War raging in the Atlantic': Russian spy sensors found near UK shores, raising security concerns</media:title>
		</media:content>
	</item>
		<item>
		<title>The Unbreakable Code</title>
		<link>https://spygadgets4sale.wordpress.com/2025/01/21/the-unbreakable-code/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/01/21/the-unbreakable-code/#respond</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 22:45:43 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Spy History]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1170</guid>

					<description><![CDATA[Can You Help Spies Crack &#8216;Impossible&#8217; WWII Pigeon Code? By&#160;Lee Ferran&#160;November 23, 2012 The best of the British code breakers have apparently met their match in a WWII-era secret message recently discovered attached to the leg of a long-dead pigeon. Cryptographers at Britain&#8217;s Government Communications Headquarters (GCHQ), the spy agency in charge of signals intelligence, [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading">Can You Help Spies Crack &#8216;Impossible&#8217; WWII Pigeon Code?</h1>



<p>By&nbsp;<strong>Lee Ferran</strong>&nbsp;November 23, 2012</p>



<figure class="wp-block-image"><img src="https://i0.wp.com/abcnews.go.com/images/Blotter/sw_pigeon_dm_121123_wblog.jpg" alt="" /></figure>



<p>The best of the British code breakers have apparently met their match in a WWII-era secret message recently discovered attached to the leg of a long-dead pigeon.</p>



<p>Cryptographers at Britain&#8217;s Government Communications Headquarters (GCHQ), the spy agency in charge of signals intelligence, have been analyzing the short handwritten message for weeks but threw up their hands Friday, saying it will be impossible to decode &#8220;without access to the original cryptographic material.&#8221;</p>



<p>The note, written on official stationary with the heading &#8220;Pigeon Service,&#8221; was discovered in a red canister attached to the skeletal leg of a pigeon in a chimney in Surrey. The message is made up of 27 seemingly random five-letter blocks and though it&#8217;s undated, government analysts believe the pigeon met his end while on a secret mission during the Second World War. The note is signed &#8220;Sjt W Stot&#8221; and was intended for the destination &#8220;XO2.&#8221;</p>



<p>In a statement released overnight, the GCHQ said that during the war, secret communications would often utilize specialized codebooks &#8220;in which each code group of four or five letters had a meaning relevant to a specific operation, allowing much information to be sent in a short message.&#8221; The GCHQ said that those messages may have been put through an additional layer of security by being re-coded with what&#8217;s known as a one-time pad.</p>



<p>One-time pads make up a theoretically uncrackable secret communications system in which an agent could encode a message using a key that uses truly random numbers to translate plain text into what looks like jibberish. The recipient of the coded message would then only be able to decode the message if they possessed an identical key. After a single use, both keys would be destroyed.</p>



<p>&#8220;This means that without access to the relevant codebooks and details of any additional encryption used, it will remain impossible to decrypt,&#8221; the GCHQ said.</p>



<p>Nearly a quarter million carrier pigeons were used during the Second World War by various branches of the British military including Britain&#8217;s Special Operations Executive, according to the GCHQ. In the air, the small birds fought their own version of the war, braving enemy hawk patrols and soldiers on the ground taking potshots.</p>



<p>The GCHQ has enlisted the Pigeon Museum at Bletchy Park to trace the identity of the pigeon &#8211; each was given a service number &#8211; but is still seeking information on what &#8220;Sjt W Stot&#8221; and &#8220;X02? could tell them about the note&#8217;s origin and purpose. Was it vital information about the secret D-Day invasion plans? Was it nothing but a training exercise?</p>



<p>One GCHQ historian&nbsp;<a href="http://www.bbc.co.uk/news/uk-20456782">told BBC News</a>&nbsp;the most helpful suggestion came from the public already:</p>



<p>&#8220;A member of the public… suggested that, since the message was found in the chimney, the first two words are most likely to be &#8216;Dear Santa,'&#8221; the historian said.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/01/21/the-unbreakable-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="http://abcnews.go.com/images/Blotter/sw_pigeon_dm_121123_wblog.jpg"/>
	</item>
		<item>
		<title>UK domestic spy agency MI5 to reveal some of its secrets in London exhibition</title>
		<link>https://spygadgets4sale.wordpress.com/2025/01/21/uk-domestic-spy-agency-mi5-to-reveal-some-of-its-secrets-in-london-exhibition/</link>
					<comments>https://spygadgets4sale.wordpress.com/2025/01/21/uk-domestic-spy-agency-mi5-to-reveal-some-of-its-secrets-in-london-exhibition/#comments</comments>
		
		<dc:creator><![CDATA[Enigma]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 16:54:26 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[SpyTrade Craft]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[spy]]></category>
		<guid isPermaLink="false">http://spygadgets4sale.wordpress.com/?p=1160</guid>

					<description><![CDATA[A World War II-era guide to tailing a target, and files on notorious double agents such as Kim Philby, feature in MI5: Official Secrets show Reading Time: 2 minutes Agence France-Presse Published: 3:15pm, 14 Jan 2025 Updated: 3:37pm, 14 Jan 2025]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">A World War II-era guide to tailing a target, and files on notorious double agents such as Kim Philby, feature in MI5: Official Secrets show</h3>



<p>Reading Time: <strong>2 minutes</strong></p>



<figure class="wp-block-image"><a href="https://www.scmp.com/lifestyle/arts/article/3294634/spy-secrets-revealed-london-mi5-exhibition-giving-insiders-perspective-espionage?module=perpetual_scroll_0&amp;pgtype=article"><img src="https://cdn.i-scmp.com/sites/default/files/styles/1020x680/public/d8/images/canvas/2025/01/14/3deb6455-0f33-4dfe-806c-7d84493695a1_1e5e0934.jpg?itok=PfYfI13e&amp;v=1736823895" alt="British double agent Kim Philby’s file will be among the items on show in MI5: Official Secrets, an exhibition that will open at London’s National Archives in the coming months. Photo: Reuters" /></a></figure>



<p><a href="https://www.scmp.com/author/agence-france-presse-1">Agence France-Presse</a></p>



<p>Published: 3:15pm, 14 Jan 2025</p>



<p>Updated: 3:37pm, 14 Jan 2025</p>
]]></content:encoded>
					
					<wfw:commentRss>https://spygadgets4sale.wordpress.com/2025/01/21/uk-domestic-spy-agency-mi5-to-reveal-some-of-its-secrets-in-london-exhibition/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		
		<media:content medium="image" url="https://0.gravatar.com/avatar/c3cfacb912cc30cb36115e787cf7fe495cfa81f47ba9b38244fcd7e2a639d00d?s=96&amp;d=identicon&amp;r=G">
			<media:title type="html">sfactor07</media:title>
		</media:content>

		<media:content medium="image" url="https://cdn.i-scmp.com/sites/default/files/styles/1020x680/public/d8/images/canvas/2025/01/14/3deb6455-0f33-4dfe-806c-7d84493695a1_1e5e0934.jpg?itok=PfYfI13e&amp;v=1736823895">
			<media:title type="html">British double agent Kim Philby’s file will be among the items on show in MI5: Official Secrets, an exhibition that will open at London’s National Archives in the coming months. Photo: Reuters</media:title>
		</media:content>
	</item>
	</channel>
</rss>