ERII Conference Award Winner: Best Presentation

October 2nd, 2018|

2018 ERII Counterespionage Conference

WINNER of “The Glenn H. Whidden Award for Best Presentation”.

JASON MILES DIBLEY; Technical Director, QCC Global Ltd.

“Device Deployment – What Are We Looking For? From Quick Plant to Deep Fit”

Are Fears Over Brexit Talks Being Bugged Warranted?

August 16th, 2018|

Earlier this week a story broke stating that the European Union’s Brexit negotiators feared they were being bugged by the British secret service. These fears were allegedly raised on July 13th during a meeting in the European Council by a top member of Michel Barnier’s Brexit negotiating team.

Suspicion …read more

Are Open Wi-Fi Networks Secure?

July 31st, 2018|

What’s the issue?
When looking to connect to an open Wi-Fi network at an airport lounge, local coffee shop, hotel etc, it’s important to understand the security risks involved with joining an ‘Open’ or ‘Public’ network and what can be done to help mitigate the risks to help keep …read more

Eavesdropping Devices Found in Restaurant

May 16th, 2018|

Police investigators believe two eavesdropping devices found inside a Europort restaurant placed on the underside of a table, could be related to comparable bugging cases in 2014 that targeted financial executives and prominent lawyers.
Past Devices
The two bugs discovered were reportedly alike another found underneath a table located in …read more

Why are Illicit mobile phones rife in prisons?

December 19th, 2016|

On the surface, it is hard to understand how on Friday 16th December 2016 we could watch almost live video of prisoners rioting inside HMP Birmingham filmed by the prisoners themselves on illicit mobile phones.

1. Why are the prison authorities allowing illicit mobile phones in prisons?

2. Can nothing …read more

Data Theft Problem

September 27th, 2016|

Quantifying the data theft problem is not easy to do, but the answer to the question ‘how much data actually gets stolen?’ is undoubtedly “more than we think”.

A.T. Smith, the assistant director of the United States Secret Service, estimates that in 2010, cyberthieves stole 867 terabytes of data …read more

India vs. USA

August 19th, 2016|

It sounds a bit like David and Goliath, but the Indian Military Intelligence Service is alleged to be hacking into the emails of an official US commission focused on issues of cyber-security.

The Times of India reports that Indian military intelligence documents have been posted on the Internet which …read more

UK caught spying on Russia

July 10th, 2016|

The British have finally come clean regarding the ‘Spy scandal that rocked Russia’.

In January 2006 Russian television ran a report showing how a plastic fake rock containing electronic equipment had been used by British diplomats to receive and transmit information.

The Russians had alleged that officials from the UK …read more

Corporate Espionage is Endemic

June 10th, 2016|

Getting a handle on just how many firms are actively engaging in spying on their competitors is exceedingly difficult. By its nature, such activity remains secret.

However The Associated Chambers of Commerce and Industry of India has managed to convince 1,500 CEOs from large Indian companies to anonymously answer …read more

Mobile Phones increasingly popular targets

April 10th, 2016|

Forget, voice-mail hacking; over the last couple of years, it is the bugging of mobile phones that has become a major headache for security managers.

According to a new report from Lookout Mobile Security, 54% of all smartphone users fail to password-protect  their handsets. As a result, if a …read more