What are The Ten Commandments of Counterintelligence? James M. Olson is the former Chief of CIA Counterintelligence and the author of Fair Play: The Moral Dilemmas of Spying. After 31 years of chasing […]
Seven News Exclusive Report: NSW Government Counter Surveillance Sweeps of Ministerial Offices to combat Foreign Intelligence bugging NSI Global Counter Intelligence group CEO Navid Sobbi was sought out for his expert opinion […]
More than ever, abusive spouses are turning to spyware and hi-tech bugs to stalk and terrorise their former partners By: Claude Khoury Spousal abuse comes in many forms including verbal, psychological, emotional, […]
WhatsApp call exploit: Human rights lawyer among the targets By: Claude Khoury Both WhatsApp and Israeli software developer NSO Group have confirmed that an exploit in WhatsApp’s voice calling allowed attackers to install […]
The levels of industrial and economic espionage have been on the rise in recent years with the advent of readily available equipment that can be purchased online. Devices such as electronic bugs, listening devices, hidden cameras, Cellular interception, Bluetooth interception, laser microphones...
The Dangers of using data recovery software – Don’t even attempt it before reading this! Historically the Christmas and New Year period sees demand for data recovery skyrocket. Digital devices mixed with […]
Mobile phone users at risk of being Bugged, Hacked and Tracked By: Claude Khoury NSI consulted with Ross Coulthard of 60 Minutes on this Special Investigation back in 2015. Currently, every commonly […]
Most basic sweeps provided by competitors will only scan for transmissions from covert devices and electronic signatures. What happens when the bug is not a transmitter and its electronic signature is masked by hiding it within other electronics?