Register @ Risk Oracle

UK Serious and Organised Crime Strategy - Nov 2018

So the new multi-agency national economic crime centre launches today (2 Nov 2018) in the UK . As part of that the UK government has released two key papers: 1. Serious and Organised Crime Strategy - November 2018 2. Understanding organised crime 2015/16 Estimating the scale and the social and economic costs - November 2018 More in depth commentary...
Continue reading
0
  2 Hits
  0 Comments
2 Hits
0 Comments

What's Listening & Watching...

I am often asked about covert surveillance devices and how many are found, what are they like, who uses them and where can I get one... The reality is that the technology that was once available only to governments or at least a niche commercial market is now being built into the most common devices. Here's a short list of things that have surveill...
Continue reading
0
  7 Hits
  0 Comments
7 Hits
0 Comments

Cyber Technical Surveillance Counter Measures (TSCM) - Who has accountability for this?

I recently talked to members of the Singapore Security Meetup (cyber security professionals) about the inclusion of Technical Surveillance Counter Measures (TSCM) within Cyber Security. In this short video from the presentation I talk about how a Cyber TSCM often has no natural home and as it sits across an accountability boundary it can be exploit...
Continue reading
0
  8 Hits
  0 Comments
8 Hits
0 Comments

Cyber Technical Surveillance Counter Measures (TSCM) part of your penetration test?

  Traditional Technical Surveillance has changed from large audio and video eavesdropping devices heavily reliant on Radio Frequency to miniaturised devices that use cellular & Wi-Fi.  No longer do you need a static listening post nearby but can access the covert feeds anywhere in world through cheap readily available technology and local cellu...
Continue reading
0
  8 Hits
  0 Comments
8 Hits
0 Comments

Cyber Technical Surveillance @ Kaspersky Lab's Press Conference

I was recently invited to be the guest speaker at the Kaspersky Lab Press Conference, 6th July during the INTERPOL World Exhibition Congress . During the conference I talked about how technical surveillance has changed over the years and is a threat that must be considered when managing cyber security. Have a read of my earlier article titled Cyber...
Continue reading
0
  7 Hits
  0 Comments
7 Hits
0 Comments

CIA Hacks Smart TVs... Surprised? Why?

  At the start of February I published a post related to the surveillance teams dream devices, the ones that are with you all the time or in your home . Video, voice, geo-location and data transmission capabilities are built into so many common devices we shouldn't be surprised that they are a target by an intelligence agency. The Guardian last yea...
Continue reading
0
  6 Hits
  0 Comments
6 Hits
0 Comments

Covert Surveillance using Mobile Networks

An article I published in February gave a basic introduction to Technical Audio, Data and Visual Surveillance Threats . Like many of you who work in the risk management field we must assess the risk and determine the appropriate response. There are several assessment methodologies so I wanted to give some insight into surveillance devices using mob...
Continue reading
0
  7 Hits
  0 Comments
7 Hits
0 Comments

Writing Intelligence Reports that help Insight

I've worked in both the public and private sector and managed multiple risk types but whatever the environment there are always a mountain of reports. Often these reports are dense and weighty, trying to pick out the insight is a chore. The consumers of these reports would often say "what's it telling me?" " what am I supposed to do with this?" "Sh...
Continue reading
0
  3 Hits
  0 Comments
3 Hits
0 Comments

Technical Audio, Data & Visual Surveillance Threats – Part 3 – Light/Optical, Laser Devices & Selecting a TSCM Provider

Part 1 - Technical Audio, Data & Visual Surveillance Threats – Introduction Part 2 - Technical Audio, Data & Visual Surveillance Threats – Radio GSM Devices Light/Optical Devices The use of light and other optical methods to transmit audio from a target location has been in use for some time. Fibre Optic microphones (without metal or magnet...
Continue reading
0
  17 Hits
  0 Comments
17 Hits
0 Comments

Technical Audio, Data & Visual Surveillance Threats – Part 2 – Radio & GSM Devices

Part 1 - Technical Audio, Data & Visual Surveillance Threats – Introduction Part 3 - Technical Audio, Data & Visual Surveillance Threats – Light/Optical, Laser Devices & Selecting a TSCM Provider Radio Devices Covert audio surveillance has changed immeasurably in the last few years. Traditionally audio would be picked up by a microphone...
Continue reading
0
  8 Hits
  0 Comments
8 Hits
0 Comments

Technical Audio, Data & Visual Surveillance Threats – Part 1 – Introduction

Changing technology is a constant and consumer focused companies work on fast design, development and delivery cycles meaning the latest tech is quick to market. We expect our devices to relay calls, surf the internet, stream entertainment, control our home and be able to do it from anywhere in the world. This series of short articles includes: ​ P...
Continue reading
0
  6 Hits
  0 Comments
6 Hits
0 Comments

The Current State of Technical Surveillance aka Bugging


Having just been a member of the Cyber Security in the Hybrid IT Environment at the  Data Centre Dynamics Conference 2017 I thought it a good time to share a short video on the panels thoughts. Some key takeaways were: Singapore's draft Cyber Security Bill is a start but likely to go through a number of "relatively rapid" revisions once it becomes ...
Continue reading
0
  31 Hits
  0 Comments
31 Hits
0 Comments