LinkedIn Tracking
13 Apr 2021
How does Data Recovery Work

Everything You Need to Know About Data Recovery

Everything You Need to Know About Data Recovery! Data recovery is one of the things that you don’t know about until you need it. You are probably unaware that intelligence firms focus […]
23 Nov 2020
Mobile Phone & Data Recovery Guide Australia

Mobile Phone & Data Recovery Guide Australia

Mobile Phone & Data Recovery Guide Australia Smartphones have become an essential part of our life. They hold data about every aspect of our lives, from messages to emails, to photos and […]
16 Jul 2020
Google Firebase Tracking incognito NSI Global

Google faces a second class-action lawsuit related to alleged clandestine tracking in apps

Google faces a second class-action lawsuit related to alleged clandestine tracking in apps By: Claude Khoury OAKLAND, Calif. (Reuters) – A lawsuit seeking class-action status alleged on Tuesday that Alphabet Incorporated’s (GOOGL.O) […]
10 Jul 2020
news heading bg v

6 Tips to Hiring the Right Corporate Private Investigators

6 Tips for Hiring the Right Corporate Private Investigators In the corporate world, information is key to getting the upper hand on competitors. In fact, the value of information can translate to […]
5 May 2020

What are The Ten Commandments of Counterintelligence?

What are The Ten Commandments of Counterintelligence? James M. Olson is the former Chief of CIA Counterintelligence and the author of Fair Play: The Moral Dilemmas of Spying. After 31 years of chasing […]
15 Apr 2020

Seven News Exclusive Report: NSW Government Counter Surveillance Sweeps

Seven News Exclusive Report: NSW Government Counter Surveillance Sweeps of Ministerial Offices to combat Foreign Intelligence bugging NSI Global Counter Intelligence group CEO Navid Sobbi was sought out for his expert opinion […]
8 Mar 2020

Are the sensors in your mobile device spying on you?

Are the sensors in your mobile device spying on you? By: Navid Sobbi Research from Newcastle University shows that PINs and passwords can be discovered by apps that hijack your mobile device’s […]
14 Feb 2020

How to Detect Eavesdropping Devices through Bug Sweeps

How to Detect Eavesdropping Devices through Bug Sweeps Each and every person on the planet has a right to their own personal security and privacy, however, there are those out there who […]
31 Jan 2020

Protecting yourself against SIM Swapping

How to protect yourself against SIM Swapping What is SIM Swapping? SIM swapping involves a criminal accessing your personal data by pretending to be you. The criminal then claims to have lost […]
15 Dec 2019

Why Background Checks are Important for Corporations

Why Background Checks are Important for Corporations Background checks are important to make sure that the person you’ll hire is trustworthy.  No matter how fine he or she looks and acts, you […]
24 Sep 2019

Increased use of Spyware and Hi-Tech bugs to stalk and terrorise partners

More than ever, abusive spouses are turning to spyware and hi-tech bugs to stalk and terrorise their former partners By: Claude Khoury Spousal abuse comes in many forms including verbal, psychological, emotional, […]
19 Jul 2019

Can mobile phone data be recovered after a reset?

Can mobile phone data be recovered after a factory reset? By: Navid Sobbi and Claude Khoury Yes, data can be recovered utilising a forensic data recovery process after a factory reset. In […]
21 May 2019

How to recover Facebook messages?

How to recover Facebook messages. Can you get back deleted messages on Messenger? By: Navid Sobbi This is a question our technicians are asked on a daily basis. Facebook Messenger messages may […]
19 May 2019

Is it possible to retrieve deleted text messages?

Is it possible to retrieve deleted text messages? By: Navid Sobbi If you have ever accidentally deleted a text message from your mobile phone and wanted to get it back, the answer […]
14 May 2019

WhatsApp call exploit: Human rights lawyer among the targets

WhatsApp call exploit: Human rights lawyer among the targets By: Claude Khoury Both WhatsApp and Israeli software developer NSO Group have confirmed that an exploit in WhatsApp voice calling allowed attackers to […]
9 Oct 2018

The Benefits of Conducting a TSCM Bug Sweep

The levels of industrial and economic espionage have been on the rise in recent years with the advent of readily available equipment that can be purchased online. Devices such as electronic bugs, listening devices, hidden cameras, Cellular interception, Bluetooth interception, laser microphones...
Contact