Feeds

Russians arrest one in James Bond rock scandal

UK diplomats interfaced with Wi-Fi stone, says Rosa Klebb

Internet Security Threat Report 2014

Readers who are fans of the old school of espionage - where blokes called Smiley directed chaps in thick overcoats to dead letter drops and nuclear scientists were brought in from the cold through the Iron Curtain in the boots of Trabants - have undoubtedly been following the tremendous tale of the spying Brit diplomats and their amazing magic spy rock.

For those of you who have not yet caught the unfolding international scandal, the BBC reports that a Russian TV documentary has firmly fingered Brit diplomats in Russia for "spying" - an accusation backed up by the country's FSB state security service which said that "everything that was shown [in the programme] was true and based on our information".

According to the Russians, four UK embassy officials and one Russian citizen have been gathering unspecified intelligence which will doubtless be of use later when the time comes for Sean Connery to put on his gas mask and swipe the Lektor cypher machine.

Accordingly, it's only right that at this point Q should enter stage left saying "Now pay attention 007" while pointing meaningfully at an innocent-looking rock on his desk.

That hi-tech rock in fullYes, that's right, not only have we been John le Carréing it up in Moscow but our embassy chaps have been downloading classified material from a hi-tech rock (seen left) planted in a Moscow street. More specifically, the TV programme claims the five ne'er-do-wells in question "downloaded classified data from a transmitter in the rock onto palm-top computers". Their Russian agent (codename "Rock-bottom"?) is then "caught on camera carrying it away".

Technical details on the rock are not forthcoming, although one unnamed FSB operative assured the TV the Bondesque device was "absolutely new spy technology".

For the record, the rock-carrying Russian has now been arrested, so we think it's only a matter of time before a combination of KGB-developed mind-control techniques and Red Grant bearing an axe get the truth out of him.

Which makes the Foreign Office's protests that it has no idea whatsoever about Wi-Fi rocks rather pointless. Better to 'fess up now and see if we can't arrange an exchange of hostages at Checkpoint Charlie: you send us our Russian rock bloke and we'll hand over Roman Abramovic. ®

Beginner's guide to SSL certificates

More from The Register

next story
WRISTJOB LOVE BONANZA: justWatch sex app promises blind date hookups
Mankind shuffles into the future, five fingers at a time
Every billionaire needs a PANZER TANK, right? STOP THERE, Paul Allen
Angry Microsoftie hauls auctioneers to court over stalled Pzkw. IV 'deal'
Apple's Mr Havisham: Tim Cook says dead Steve Jobs' office has remained untouched
'I literally think about him every day' says biz baron's old friend
Cops apologise for leaving EXPLOSIVES in suitcase at airport
'Canine training exercise' SNAFU sees woman take home booming baggage
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
Flaming drone batteries ground commercial flight before takeoff
Passenger had Something To Declare, instead fiddled while plane burned
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.