Eavesdropping Devices Found in Restaurant

May 16th, 2018|

Police investigators believe two eavesdropping devices found inside a Europort restaurant placed on the underside of a table, could be related to comparable bugging cases in 2014 that targeted financial executives and prominent lawyers.
Past Devices
The two bugs discovered were reportedly alike another found underneath a table located in …read more

Why are Illicit mobile phones rife in prisons?

December 19th, 2016|

On the surface, it is hard to understand how on Friday 16th December 2016 we could watch almost live video of prisoners rioting inside HMP Birmingham filmed by the prisoners themselves on illicit mobile phones.

1. Why are the prison authorities allowing illicit mobile phones in prisons?

2. Can nothing …read more

Data Theft Problem

September 27th, 2016|

Quantifying the data theft problem is not easy to do, but the answer to the question ‘how much data actually gets stolen?’ is undoubtedly “more than we think”.

A.T. Smith, the assistant director of the United States Secret Service, estimates that in 2010, cyberthieves stole 867 terabytes of data …read more

India vs. USA

August 19th, 2016|

It sounds a bit like David and Goliath, but the Indian Military Intelligence Service is alleged to be hacking into the emails of an official US commission focused on issues of cyber-security.

The Times of India reports that Indian military intelligence documents have been posted on the Internet which …read more

UK caught spying on Russia

July 10th, 2016|

The British have finally come clean regarding the ‘Spy scandal that rocked Russia’.

In January 2006 Russian television ran a report showing how a plastic fake rock containing electronic equipment had been used by British diplomats to receive and transmit information.

The Russians had alleged that officials from the UK …read more

Corporate Espionage is Endemic

June 10th, 2016|

Getting a handle on just how many firms are actively engaging in spying on their competitors is exceedingly difficult. By its nature, such activity remains secret.

However The Associated Chambers of Commerce and Industry of India has managed to convince 1,500 CEOs from large Indian companies to anonymously answer …read more

Mobile Phones increasingly popular targets

April 10th, 2016|

Forget, voice-mail hacking; over the last couple of years, it is the bugging of mobile phones that has become a major headache for security managers.

According to a new report from Lookout Mobile Security, 54% of all smartphone users fail to password-protect  their handsets. As a result, if a …read more

US Secret Service Sex Scandal

March 14th, 2016|

There is no suggestion as yet of a Mata Hari like spy figure, using her womanly wiles in order to steal secrets, but the very fact that United States agents opened themselves to such a possibility has already led to the resignation of one, early retirement of another …read more

US unveils long term strategy

February 28th, 2016|

The US Government has signaled how it will deal with business data theft by foreign companies in future. It intends to ‘hit them where it matters’; in the pockets of the very organisations who are profiting from corporate espionage.

In future, when Washington feels enough evidence exists that products …read more

Soviet Spies Bugged World’s First Electronic Typewriters

February 12th, 2016|

Keystroke loggers, which secretly record key presses on a computer keyboard, are today’s criminals tool of choice for stealing passwords, credit card details and other secrets. However, keystroke loggers are not an invention of the internet age. In fact, it has been revealed that the world’s most successful …read more