LinkedIn Tracking
16 Jul 2020
Google Firebase Tracking incognito NSI Global

Google faces a second class-action lawsuit related to alleged clandestine tracking in apps

Google faces a second class-action lawsuit related to alleged clandestine tracking in apps By: Claude Khoury OAKLAND, Calif. (Reuters) – A lawsuit seeking class-action status alleged on Tuesday that Alphabet Incorporated’s (GOOGL.O) […]
5 May 2020

What are The Ten Commandments of Counterintelligence?

What are The Ten Commandments of Counterintelligence? James M. Olson is the former Chief of CIA Counterintelligence and the author of Fair Play: The Moral Dilemmas of Spying. After 31 years of chasing […]
28 Aug 2018

The Threat of Laser Microphones

The Espionage Threat Many organisations have implemented sophisticated multi-million dollar cyber security architectures yet forget to think like an attacker! If an adversary can harm you or profit from sidestepping your cybersecurity protocols they will. One of the easiest targets for competitive......
14 Jul 2018

Mobile phone users at risk of being Bugged, Hacked and Tracked

Mobile phone users at risk of being Bugged, Hacked and Tracked By: Claude Khoury NSI consulted with Ross Coulthard of 60 Minutes on this Special Investigation back in 2015. Currently, every commonly […]
21 Jun 2018

Threat To Australia At All Time High From Economic And State Sponsored Espionage

Threat To Australia At All Time High From Economic And State Sponsored Espionage By: Claude Khoury As we reach the halfway mark of 2018 there is an unprecedented threat of espionage in […]
17 May 2018

More than words: The US Iran Strategy

More than words: The US Iran Strategy Article written By NSI Contributing Analyst James Baylis In the 3 months since outlining its global strategy for combating Iran, the US has taken significant […]
11 May 2018

Many Bugs go Undetected by Standard Bug Sweeps – Learn Why

Most basic sweeps provided by competitors will only scan for transmissions from covert devices and electronic signatures. What happens when the bug is not a transmitter and its electronic signature is masked by hiding it within other electronics?
Contact