
How did a saxophonist sneak sensitive information in and out of the Soviet Union? How might an Apple AirTag have led to murder? And isn’t the world of cryptocurrency and blockchain doing just great?
All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Have you been all right? Yes, I've been all right. Oh, that's so good. Did you have any fun at all? Were you able to— no, I had no fun at all. You had no fun at all with that redhead?
Smashing Security, Episode 279: Encrypted Notes and a Deadly Case of AirTag Spying with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Smashing Security Episode 279. My name is Graham Cluley.
I'm actually in beautiful Croatia, and I love our listeners so much that I've kicked everyone out of the house. And here I am on a travel mic.
So if I sound a little different, that's why, to do the show.
You will recall, folks, that Geoff ran a little competition for a signed copy of his new book, The Lazarus Heist, we asked people to write in for a chance to win a free signed copy of his book.
And I can announce that we now have a winner. So please stop writing in.
Thank you very much, Joss, for taking part and everybody else as well.
Now, I wasn't at the RSA conference this year, but it's always great to see the reports of what's going on there.
And there was a woman called Meryl Goldberg who was speaking, and she was talking about her experiences way back in 1985. As you know, I like to keep things topical.
It was the Soviet Union. It wasn't really Russia then.
So you say Moscow north of the border and Moscow beneath. Okay. And she went there with some other musicians. And she had a great story to tell.
Now, unlike Timothy Dalton in The Living Daylights, she did not get entangled with some KGB agents and then escape down a snowy mountain on a cello case.
Is there a Welsh agenda keeping Welsh people out of the RSA conference? Well, no, she was a saxophonist and she was playing in a band called the Boston Klezmer Conservatory Band.
And they decided as some sort of cultural expedition that they would go to the Soviet Union and play with Soviet musicians.
And this was a thing which didn't happen that much at the time.
It was quite rare for the musicians to sort of get together and meet over there and play music together because generally the Soviet authorities thought that was perhaps not the thing to have some of that crazy saxophone music in the USSR.
You know, it may sort of corrupt the youth or something like that. But she wanted to meet up with a group called the Phantom Orchestra.
It was a group of Jewish people in the Soviet Union who maybe weren't too happy with how the authorities were running the Soviet Union at the time.
So, Meryl Goldberg, her trip was backed up by a non-profit group that was helping Jews in the then Soviet Union emigrate to the United States and Israel.
And if you can throw your mind back that many years, you would know it wasn't—
So this group of American musicians, including our hero Meryl, went out there, and she realized, "Oh boy, it'd be kind of handy if we could smuggle some information in and out of the USSR, including maybe details of who was looking to escape the Soviet Union," because there were people who were, you know, looking to relocate, as I said, to Israel and the United States.
And to get out. But it turns out that the Soviet authorities were onto this sort of thing.
And so if you tried to go into the Soviet Union, they would search all your belongings, right?
They would go through your cello case, they would go through your handbag, they would look between your toes, they would look everywhere imaginable to see if you had secreted some information or were trying to take in something.
So if you had documents which had, for instance, people's names and addresses of you are planning to meet, then that would be something which they'd say, maybe they wouldn't have an accent like that, but they'd say, what's all this about then?
What are you up to here? Why are you taking this information in and out?
I am very glad that I haven't had to deal with that instance of having to try and be subversive against, you know, the country that I was based in or get other people to do it.
It's very complicated, hard stuff. Yeah.
I wasn't expecting the police to come round and interview me about it. By the way, I didn't do the murder. I didn't know the victim.
I didn't know the murderer, but I was interviewed about a murder case.
And I thought, oh my goodness, you know, oh my God, you think everything you're going to say is going to incriminate yourself.
Because my place at the time was a bit untidy. It looked like I could have been a murderer. And they said, oh, we don't normally ring ahead to warn you that we're coming.
Okay, fair enough. Anyway. It's fine. I'm just a podcaster now. It's acceptable. But anyway, I can imagine the stress. I can imagine that.
So the group, Meryl and her pals, her, you know, performing pals, they had been told to expect to be under surveillance, treated with suspicion, etc.
And they had found that everything was being— even apparently their Tampax was unwrapped. And everything that they were— yeah, exactly.
Because they're just looking for anything, right? They know that you might buy things.
And I look over and this guy has two tampon strings sticking out of his nose at the driving wheel of the car next to me.
Anyway, so Meryl Goldberg, she thought, "Well, how can I sneak information through?" And what she did was she devised a way of coding information into the musical notation.
And so she handwrote out musical scores And of course, the music, as you may not know, Carole, only goes from A to G, right?
You get flats and you get sharps, and maybe you can go into other— what are they called?
Anyway, so she managed to encode all this information into this music, and what it turned out that was the KGB agents who were spying upon them.
They just thought, oh, this is just bloody music, you know, I'm not interested in this.
They didn't go and try and play it because if they tried to play it, it would probably sound like modern acid jazz or something really horrendous, or Stockhausen, you know.
It would just sound like, oh my goodness, what on earth is this? Someone described it as sounding like a cat walking across piano. You can imagine that kind of music.
And then I suppose they'd have to sift through that, looking for— yeah. God, gross. Anyway, they were tailed constantly. They did manage to meet up with these dissidents.
They eventually had their passports seized, they were expelled, but they managed to get information both in and out of the country.
And some of apparently the people they met up with, some of the Soviet activists, did face consequences for the visit. In the reports I've read, that's sort of been glossed over.
Oh, there were consequences for some of the people they met up with.
Meryl Goldberg does admit that, you know, if someone actually analyzed it, it was more obfuscation perhaps than encryption, but it was still enough to serve its purpose.
And as a consequence, the groups obviously achieved their ambitions.
100% free, and we aim to continually update it with relevant exhibits and information.
And the problem is you don't have any proof and you want proof to help you decide whether you're a paranoid freako or a bona fide Columbo?
It's hard to ignore the extra-long poop breaks, phone in hand, of course, or late nights out without you, obviously, you know, or the faint smell of new love in the air.
You know, maybe she's always humming suddenly, or things this. And basically, you just want to know what the eff is up. So I want to know what steps you would take at this stage.
If she starts calling me Geoff or something, then I might think, oh, I wonder who this Geoff guy is.
That would be telling.
So if you lose your AirTag, you can sort of get where it is, can't you? You can get some sort of location information.
It's basically a Bluetooth, private Bluetooth device that pings out and finds any Apple device in the vicinity and uses that device to inform Apple to inform you that here is where your device is.
So it activates the GPS in the device that it, you know, the iPhone, for example, that it can connect to.
So this is where Miss Gaylynn Morris apparently did to her partner, Andre Smith. Both these people are 26, and earlier this month, Miss Morris was convinced that Mr.
Smith was cheating on her because basically he wasn't coming home at night. So that was kind of a tip-off, right?
And she probably gave him no heat and said, "Have fun, honey bunch." But really, she was probably waiting for him to go so she could follow him and find out where he is.
Smith's appearance to the other patrons lurking outside and says, "Look, he's my boyfriend. I think he's cheating on me, and I want to know if he's in the bar."
I want to catch him out." So it turns out Miss Morris seems to enter Tilly's bar, and she quickly spots her man, Mr. Morris. And guess what? He is not alone. She was right.
He's obviously playing the Judas, and by having a drink with a lady who is not Miss Morris.
You see your girlfriend with some hot hunk of love that you're not comfortable with. What do you do now?
Do you just go, okay, now I know, and I'm leaving, and I'll let her know when she comes home, or what?
I wait for them to come back. And I say, oh darling, you've been working so hard, haven't you? You've been working so hard. Have you been all right? Have you been all right?
Yes, I've been all right. Oh, that's so good. Did you have any fun at all? Were you able to? No, I had no fun at all. You had no fun at all? No fun at all with that redhead?
But the companion says, "Actually, I'm waiting for food that I've paid for, so I'm gonna stay right here." Who ordered the calamari? Yes.
I wouldn't do the WTF, girlfriend, who do you think you are with my man kind of thing.
First of all, she should be, surely if she's upset with anyone, she should be upset with her guy, not with the woman.
But anyway, regardless of that, because the woman may not know that he's in a relationship. But wouldn't it be cooler just to sit down at the table and just go, hi?
They're kind of in this fog of what? WTF? Jealousy, crazy.
Miss Morris does decide to get the heck out of Dodge, gets into her car and drives off. And Mr. Smith also leaves, right? And he steps out onto the sidewalk.
Miss Morris zooms back, mounts the sidewalk with her car, and literally runs him over. Like, literally.
Maybe he's been seeking some assistance from outside of his relationship.
They saw the bottle incident inside the, you know, probably people came outside to see what was going on.
And there are reports that this guy witnessing all this tries to step in front of the car to protect Mr.
Smith, but Morris, alas, drives around him, hitting him in the left hip with her car mirror before running over Mr. Smith for a third time.
The passenger side front wheel, and she can't get to him. And when the cops arrived, are you surprised that Mr. Smith is dead after being run over 3 times?
Now you all know that we are big fans of password managers at Smashing Security because it's an important tool for generating and saving secure credentials for every online account.
Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments.
Bitwarden is transparent and secure using end-to-end and zero-knowledge encryption with source code that can be scrutinized.
Now you can go to bitwarden.com/smashing and try it for free across devices as an individual user, or you can start a free trial of a Teams Enterprise plan.
And the thing I like about this, a good password manager is robust and cost-effective.
As it can radically improve your chances of staying safe online, all without requiring super high-tech expertise. Go to bitwarden.com/smashing.
Start your free password manager trial today.
Collide is perfect for organizations that care deeply about compliance and security but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Collide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/collide. That's smashingsecurity.com/collide.
You can try KOLIDE with all of its features on an unlimited number of devices for free, no credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/kolide. And thanks to KOLIDE for supporting the show.
At G2's highest-rated cloud compliance software, Drata streamlines your SOC 2, your ISO 27001, your PCI DSS, your GDPR, and your HIPAA compliance.
Plus, it provides 24-hour continuous control monitoring so you can focus on scaling securely. Drata is the only compliance automation platform with a private tenant database.
They say it's having your cake and securing it too.
Countless security professionals from companies including Notion, FullStory, and BambooHR have shared how crucial it is to have Drata as a trusted partner in their compliance process.
Listeners, you can get 10% off Drata and waived implementation fees by visiting smashingsecurity.com/drata. That's D-R-A-T-A. And thanks to Drata for sponsoring the show.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security related necessarily.
It says Web3 is going just great and is definitely not an enormous grift that's pouring lighter fluid on our already smoldering planet.
And so it's basically stories of hacks, of scams, of money being lost, of everything.
The site even includes what he calls its grift counter, which is a running total of the amount of money lost so far to Web3 grifts and scams and crypto nonsense increments as you scroll through the page.
Currently it's at about $9 billion, they reckon.
And so that is why web3isgoinggreat.com is my pick of the week.
I'd read it online all the time, but honestly, I'm just in front of the screen just too much for me.
And now I can with Audem because Audem is an app that curates the best long articles from about a dozen pretty high-caliber publishers like The Atlantic, The New York Times, the wonderful New Yorker, Rolling Stone, and others.
So you have also the written version in the app. You could choose your narration speed. So if you need it to be really slow, really fast, you can do that.
And what's cool about it is rather than paying every single publisher their fee to have access to their content, you can pay the price of Audible to get access to many great stories from many different publishers, which I like.
And occasionally on Sundays, they play an Audem version of a long-form New York Times article. And after that you're charged $9 a month, which is pretty reasonable.
Because you could hoover up a lot of content in that time.
So I think if any of you out there rather listen than read sometimes, this is definitely worth checking out.
But at the moment, I think there may be some automation because, you know, sort of pauses are the same length, that kind of thing.
And I hope you enjoy it. That's my pick of the week.
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast apps such as Overcast, Spotify, and Apple Podcasts.
And as always, for episode show notes, sponsorship info, guest list, and the entire back catalog of more than 277 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Show notes:
- Welsh James Bond Timothy Dalton's cello escape in "The Living Daylights" — YouTube.
- How a Saxophonist Tricked the KGB by Encrypting Secrets in Music — Wired.
- Woman accused of killing boyfriend using AirTag tracking — The Register.
- Andre Smith fatally struck by car outside Tilly's Pub, woman charged — Indy Star.
- Indianapolis woman Gaylyn Morris accused of tracking boyfriend with Apple AirTag, killing him with car, police say — The Washington Post.
- An update on AirTag and unwanted tracking — Apple.
- Apple Updates iPhone with 'Safety Check' for Domestic Victims — Gizmodo.
- Web3 is going just great.
- Audm – Listen to feature stories from The Atlantic, WIRED, and more.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
A password manager is an important tool for generating and saving secure credentials for every online account. Bitwarden makes it easy to stay secure and for businesses to share logins with team members and departments. Open source with published 3rd party security audits, Bitwarden is transparent and secure, utilizing end-to-end and zero knowledge encryption with source code that can be scrutinized by all.
Learn how Bitwarden can help you do business faster and more securely at bitwarden.com/smashing and start a free business plan trial today.
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
Is your organization finding it difficult to achieve compliance and scale its security posture? As G2’s highest rated cloud compliance software, Drata streamlines your SOC 2, ISO 27001, PCI DSS, GDPR & HIPAA compliance and provides 24-hour continuous control monitoring so you focus on scaling securely. Drata is also the only compliance automation platform with a private tenant database. That’s like having your cake and securing it too
Countless security professionals from companies including Notion, FullStory, & BambooHR have shared how crucial it has been to have Drata as a trusted partner in the compliance process.
Listeners of Smashing Security can get 10% off Drata and waived implementation fees at smashingsecurity.com/drata
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


