You are here:   Home NEWS Archive

NEWS Archive

 

Reducing Insider Threats pre employment screenings - 28 April 2016 Click to view

Corporate Espionage and Protectng Proprietary Information - 27 April 2016 Click to view

How cops and crooks can 'grab' your cellphone - and you - 27 Nov 2015 00:00 Heidi Swart
Click to view

Man in dock over R25m bugging device  (Star 4 August 2015) Click to view

‘Grabber’ nabbed in big sting  (Star 3 August 2015) Click to view

Three held for possessing ‘spy machine’ (Star 3 August 2015) Click to view

SA Spies’ Shopping List (Sunday Times 12 July 2015) Click to view

TSCM Training – Who Needs It?  (Intersec June 2015) Click to view

Suspicious of your partner? Bug them. (Sunday Times, 17 May 2015) Click to view

“De-bugging” Partners for 20 Years in Europe & Sub-Saharan Africa (Intersec February 2015) Click to view

Watch and Learn (Intersec) - Covert surveillance threats faced by officials and business leaders travelling abroad.

Watching the Watchers (Intersec) - In 2003, the newly launched UK Security Industry Authority (SIA) began the process of regulating and licensing the private security industry

Digital Forensics Unlocked (Intersec - October 2014) - With Courts still failing to take advantage of mobile digital forensic evidence, legal systems must accommodate and embrace this data to successfully investigate and prosecute terrorists

Bugs, Espionage and the Insider Threat(Intersec - October 2014) - How cheap, widely available covert surveillance technology is making corporate espionage by employees an increasingly urgent threat.

Protect your intellectual property and trade secrets against the imminent threat of corporate espionage. The reality of focussed communication breaches.

How can I tell if my mobile phone is tapped. Mobile spy and cellular bugging

The digital spies are watching you It's time to fight for you.

Hack turns the Cisco phone on your desk into a remote bugging device No fix yet for attack that allows eavesdropping on private conversations.

YOUR Cisco VoIP phone is easily TAPPED, warns CompSci prof Eavesdrop on calls using kernel security bug

29C3: Big bugging with Cisco VoIP phones At the 29C3 hacker congress in Hamburg, security researchers from Columbia University have demonstrated that the microphone in the receiver of internet-based Cisco phones can be turned into a remotely controlled listening device.

Popular office phones vulnerable to eavesdropping hack, researchers say This small gadget can be attached to a single Cisco IP phone and turn an entire company’s network into a sophisticated bugging device within seconds, researchers say.

Serious flaw allows Cisco IP phones to be used for spying Researchers have demonstrated how a serious vulnerability in the 7900 series of the Cisco (NASDAQ: CSCO) Unified IP Phones can be used to transform them into bugging devices in order to eavesdrop on private conversations.

The hunt for Red October: five-year cyber espionage campaign uncovered
A Russian cybersecurity company issued a report on Monday saying that it had identified a sophisticated cyber espionage campaign that has been in operation since 2007.

Knick deploy high-tech mics to record Carmelo Anthony’s on-court chats
League sources have confirmed Knicks owner James Dolan, in the wake of the highly volatile trash-talking war between star Carmelo Anthony and the Celtics’ Kevin Garnett last week, ordered two technicians to hold high-tech, sensitive microphones at opposite ends of the Madison Square Garden court to record all in-game conversations by and around his star.

New book tells of Londoner who Eavesdropped on Holocaust horrors
New book reveals vast bugging operation against captured Nazis. Historian uncovers full scale of operation to covertly record Nazi war crimes

PM hints at ‘nearby’ figures for bugging
Prime Minister Recep Tayyip Erdoğan has hinted that “those physically close to him” might have been responsible for alleged wiretapping but stopped short of detailing whether or not his bodyguards are suspected of the eavesdropping.

Speculations mount over PM’s wiretapping
Fingers continue to be pointed as speculation grows in Ankara over who is responsible for wiretapping the prime minister

FBI's Desire to Wiretap Every New Technology Makes Us Less Safe
Here they go again. Every year or so we end up writing about the FBI's desire for better wiretapping capabilities for new technologies, such as Skype. Basically, the FBI argues that because "bad guys" might use those tools to communicate in secret, they need backdoors to make sure that they can keep tabs on the bad guys.

The FBI Needs Hackers, Not Backdoors
Just imagine if all the applications and services you saw or heard about at CES last week had to be designed to be “wiretap ready” before they could be offered on the market. Before regular people like you or me could use them.

DA: County controller under investigation for wiretapping
Luzerne County Controller Walter L. Griffith Jr. is under criminal investigation for illegally recording dozens of conversations over the last two years, District Attorney Stefanie Salavantis told The Citizens' Voice, a Times-Shamrock newspaper.

Special wiretap search team to be formed for Turkish PM
The Prime Ministry's team of bodyguards is set to form a new security branch, following the discovery of illegal bugs in Prime Minister Recep Tayyip Erdoğan's offices, daily Milliyet has reported.

Debugging Corporate Aircraft 
Blake Technical Limited carry out comprehensive TSCM electronic countermeasure searches specifically geared for Corporate Aircraft.

Wiretapping and Other Eavesdropping Devices and Methods
Wiretapping and electronic eavesdropping are virtually as old as the telephone.

The Secret War 
Foreign spies hack computers to bleed billions from industry and steal military secrets.

Hacked to Death 
Is hacking wicked and antisocial, or cool and geeky? A brief history of tech's most two sided term.

Did News Corp. properties break any U.S. laws?
Editors at the New York Post pulled junior staffers into two closed-door meetings on Tuesday and told them, "We have to be on our P's and Q's and not engage in any kind of obvious, unethical journalistic things," according to a source close to the Post.

Britain admits to Cold War-style espionage using fake rock
LONDON — In a rare acknowledgment of espionage reminiscent of the Cold War, a former British government official admitted that a fake rock discovered in 2006 by the Russian FSB secret service in a Moscow park concealed a listening device planted by British spies.