Google faces a second class-action lawsuit related to alleged clandestine tracking in apps By: Claude Khoury OAKLAND, Calif. (Reuters) – A lawsuit seeking class-action status alleged on Tuesday that Alphabet Incorporated’s (GOOGL.O) […]
What are The Ten Commandments of Counterintelligence? James M. Olson is the former Chief of CIA Counterintelligence and the author of Fair Play: The Moral Dilemmas of Spying. After 31 years of chasing […]
The Espionage Threat
Many organisations have implemented sophisticated multi-million dollar cyber security architectures yet forget to think like an attacker! If an adversary can harm you or profit from sidestepping your cybersecurity protocols they will. One of the easiest targets for competitive......
Mobile phone users at risk of being Bugged, Hacked and Tracked By: Claude Khoury NSI consulted with Ross Coulthard of 60 Minutes on this Special Investigation back in 2015. Currently, every commonly […]
Most basic sweeps provided by competitors will only scan for transmissions from covert devices and electronic signatures. What happens when the bug is not a transmitter and its electronic signature is masked by hiding it within other electronics?