PROTECTION AGAINST ESPIONAGE INSIDE THE HOME, OFFICE AND IN PUBLIC PLACES
We help companies, organizations and individuals to prevent and detect espionage and infiltration. Our technical team has specialized expertise that allows them to successfully search for- and identify different types of compromised equipment. This includes software, hardware, and third party data processing.
The very definition of espionage and infiltration is the interception of home phones, cellphones, wireless internet connections, wiretapping, and hidden cameras. Tracking and localizing someone by checking what cell towers their cellphones ping off of, or checking call lists or GPS locations, are also a form of espionage.
DIFFERENT TYPES OF INTRUSION
IT infrastructure today is very sensitive and easily compromised, and there are extensive security concerns and vulnerabilities in standard systems such as GSM, 3G, 4G, Wifi protocols, etc.
There are two main forms of attacks on the IT infrastructure:
- General Attack – Here, different types of networks are attacked, most often it is programmed robots that analyze specific weaknesses and attack them. This type of attack does not usually mean that the individual or company is affected as a direct consequence; however, such attacks can be exploited and taken advantage of, and it could be used as a gateway and give hackers easier access to sensitive information.
A general attack may target webcams or email accounts, or it could be carried out by sending out emails with the purpose of trying to persuade recipients to pay a certain ransom by using false threats of computer hacks. Another common strategy is the threat of there being an existing recording of the victims, obtained through the computer webcam. Most people realize that this is a scam, but what these people do is that they send emails out to a large number of individuals at once, to see who bites.
- Targeted Attack – These types of attacks are aimed directly at a specific person or company. Targeted attacks mean that the hackers are looking to obtain specific information about you or information they believe you somehow possess. These types of attacks are more advanced and sophisticated, and the perpetrators know exactly what information they are looking for. It could be your files, your emails or email account, they might want information about your routines or your contact network, and they might be wiretapping you or observing you physically. Surveillance, in this case, basically means eavesdropping, either electronically or physically.
Targeted attacks can also be used to a greater extent, where one or several employees are used to gain access to sensitive information from the company where they work. In this business, we use the term POI (Person of interest) for when an attack occurs in this way. An attack like this is unlikely to happen to someone who is not considered a POI, as most civilians do not possess valuable information.
THE EXPOSED POI GROUP
If you handle sensitive information or work in a workplace that is considered interesting or valuable to outsiders and/or competitors, then you are a person of interest – a POI. This means that you may be extra vulnerable to targeted attacks. This exposed group we usually work with tends to be made up of researchers, analysts, board members, people with a role in important decision making, or people who own companies or have a high-influence role in a company. We also work with people who are not considered POI, and it may be hard to know if you would qualify as a POI or not. All POIs we work with belong to the private sector, as politicians are protected by a different agency (SÄPO in Sweden).
All types of information can be of interest to a hacker. It does not have to be about achieving direct financial gain, and the motives aren’t always financial, or at least not at first. Hackers may plan to use the information obtained themselves or plan to sell it.
HOW TO KNOW IF I AM BEING BUGGED OR SPIED UPON?
Many may never realize they’ve become the victim of hacking or wiretapping, and this is because hackers are often so good at what they do, that their victims never even realize what’s happening. It all depends on who is behind the attack and how sophisticated it is, but few discover an intrusion themselves, and professional help is often needed.
There are ways for an Intelligence service to discover espionage attempts and data breaches, and the methods are always adjusted to fit a particular situation.
WE PROTECT YOUR BUSINESS MEETINGS FROM ESPIONAGE
Many companies contact us for help to ensure a secure business environment, for example at board meetings, contract signings or other important events. We help with preparation work before-, during- and after the meeting or event. If needed, we can also help you find a safe place to hold a meeting. From there, we go on and make sure that no hidden surveillance equipment is present at the scene.
We can help you with the following:
- Establishing safety routines; for example, for the participants to leave their cellphones a storage box that stops incoming- and outgoing signals and calls.
- Installation of temporary transmitters that interfere with- and block cell phone signals, to create a secure zone.
- Making sure that there is no hidden video and/or audio recording device in the room. We check electrical outlets, image projectors and other permanently installed equipment. We also install our own devices and equipment, made to detect different types of signals that should not be present.
THE EMPLOYEE IS THE WEAKEST LINK
It is rare for espionage and data intrusion to start with an attack directly on the company, and many hackers will instead target the employees, as they are the weakest link. This is a well-known strategy, taking advantage of the human factor, where an individual – such as an employee – provides an intentional or unintentional opportunity for hackers.
Infiltration by professional hackers is usually a very carefully planned event, where every aspect has been taken into consideration before initiating the attack. For example, it is not unusual for an employee to be coerced and manipulated into collecting valuable information from the company he or she works for, but it could also be the case that an employee has had spyware installed on their cell phone or laptop, and when they plug their device at work – the virus spreads to the company’s electronic equipment.
In the case of a more sophisticated attack, these intrusions may be carried by targeting several employees at once. This is why it is so important to set up strategic preventive plans for how to stop this before it happens and to continuously educate employees and staff members about IT security.
WE TRAIN YOUR STAFF
With the support of our parent company ISRA Intelligence, we can be hired to train and educate your staff on IT security matters, and we can set up guidelines and establish routines for how to use cell phones – which are considered high-risk electronic equipment – in the workplace, and we can also educate your employees on how to stay safe from hacking and more while traveling. Training includes detailed information on how these attacks are conducted.
HOW TO PREVENT ESPIONAGE & INFILTRATION
We help you go over existing safety protocols and see what can be changed and improved, and we analyze the risks of your classified information ending up in the hands of someone else. Based on your unique situation, we will then make recommendations for the actions and the services that would best suit your business.
WE SECURE YOUR HOME OR OFFICE
If you suspect someone might have installed hidden cameras or audio surveillance inside your home or office – we can help you locate and remove such equipment.
PREVENT HAVING YOUR CAR BUGGED
When you make calls from inside your car, or when you have a conversation with someone else riding in the car with you, there is always a risk of bugging or someone listening in or monitoring your routines. GPS tracking of a car, for example, can be used to discover where important and/or valuable goods are being transported and kept, and this is also a form of corporate espionage. Our engineers can protect your vehicle from both bugging and tracking.
PROTECT YOUR CELL PHONE FROM BEING BUGGED
If using a regular cell phone, there is – unfortunately – always a small risk of someone finding a way to either hack it or bug it, meaning they can listen in on your calls. There is no antivirus that can keep you safe from this, and a change of SIM card won’t do much either. Only real and advanced anti bugging technology can protect you from such a thread, and we have the right equipment to help you optimize your phone’s resistance to bugging and hacking.
INTRUSION THROUGH INTERNET & WIFI
It is important for a company to protect its corporate secrets from competing businesses. Although it is normal with some business based competition, it is becoming increasingly common for companies to spy on a competitor with the use of hidden (and illegal) surveillance – either through audio and/or video recordings, or by using employees in one way or the other.
Nowadays, as cell phones become increasingly important as well as technically advanced, it is common or sensitive information to be kept and shared through cellular phones. This has lead to an increased risk of being hacked or bugged, which is what happens when an outsider alters the software with the purpose of obtaining information. Wireless internet connections are also vulnerable, but we have the experience, techniques, and equipment to help make sure that the information you store and share is only available for whom it was originally intended for.
DO YOU WANT TO KNOW MORE?
Contact us for more information. We offer a free consultation, to analyze what solutions are available for you and your particular situation.