• Technical Surveillance Counter Measures - TSCM
  • Counterespionage
  • Counterintelligence
  • Cyber Counterespionage
ERII
Espionage Research Institute International

News

Potomac Falls, VA - John Cheney Platt III (Jack), aged 80, died unexpectedly on January 4, 2017 of advanced esophageal cancer. Jack, also known as "Cowboy," served proudly as an officer in the United States Marine Corps followed by 25 years of service in the Central Intelligence Agency. He led a life full of intrigue, mystery and adventure serving his country abroad in Austria, Laos and France.

2016 Espionage Research Institute International Counterespionage Conference 

 

Join us for the annual ERII Counterespionage Conference September 9, 10 & 11th 2016 at the Embassy Suites - Old Town Alexandria, VA 22314.  

Lots of companies -- and even the White House -- use a conference calling system that could possibly be tapped by hackers, according to new research.

On Thursday, cybersecurity experts at SEC Consult revealed a secret doorway that's built into a popular conference calling product built by a company called AMX.

AMX makes tablet panels used to control conference calls for businesses, government agencies and universities.

2015 ERII COUNTERESPIONAGE CONFERENCE

09/25 -27/2015, Dulles-Hyatt Herndon, VA

View the 2015 ERII Conference Program 

 

10th Annual Canadian Technical Security Conference, April 21-23, 2015 at Strathmere, near Ottawa.

CTSC 2015 is a not to be missed three (3) day professional development and networking opportunity with others in the field, as well as with key TSCM and Test & Measurement equipment manufacturers.

INDIANAPOLIS (AP) — Hackers broke into a health insurance database storing information for about 80 million people in an attack bound to stoke fears many Americans have about the privacy of their most sensitive information.

The attack on Blue Cross Blue Shield insurer Anthem could be a sign that hackers have shifted their focus away from retailers and toward other targets, cybersecurity experts say.

John Prescott has launched an investigation into who has been bugging his beloved Jaguar.The former Deputy PM, dubbed 'Two Jags' for his love of the luxury model, was stunned to discover a tracker device planted under the driver's seat. The device also has a built-in microphone which means it could have been recording all of the Labour heavyweight's conversations.

Russian lawmakers having access to confidential information may be recommended no to use iPhones in their work and to switch to simple mobile phones using them only for phone calls.

MOSCOW, December 2. /TASS/. Lawmakers from Russia's parliamentary lower house may be advised not to use iPhones over concerns that communications gadgets made abroad may not be secure. Instead, they would be urged to use the most basic mobile telephones.

A recent influx of reports about Russian electronic espionage activity has prompted fresh concerns that the Kremlin may be gunning for a cyberwar with the West.

Not everyone is convinced: Russian IT analysts interviewed by The Moscow Times were more inclined to blame the spike in attack reports on media hype and cybersecurity companies exploiting clients' fears.

But Russia's leading expert on domestic security services, Andrei Soldatov, said the pattern of the attacks indicated that the Russian government may be mounting a covert Internet offensive.

(Reuters) - China passed a counter-espionage law on Saturday aimed at tightening state security and helping build a "comprehensive" national security system, state media reported.

The law will allow authorities to seal or seize any property linked to activities deemed harmful to the country, the Xinhua news agency said.

Wall Street Journal (09/23/14) Barrett, Devlin

The FBI said Tuesday that it has seen a spike in the number of disgruntled employees who steal company information, sometimes as part of an effort to extort money from previous employers.

Corporate espionage is one of the most rapidly growing challenges corporations of all sizes must contend with. Corporate espionage, often referred to as industrial espionage, is espionage conducted for commercial benefit. It includes all manner of confidential information collection by illicit means including electronic eavesdropping/technical surveillance, HUMINT intelligence, cyber collection and related information collection by a person(s), entity(s) or country(s) for financial or other gain.

Top DNI staffer had ties to accused Chinese spy group Huawei Technologies.

The Office of the Director of National Intelligence (ODNI) has been sued by an advocacy group seeking the release of internal documents of a top intelligence adviser who was also working with a controversial Chinese technology company that has been identified as a potential espionage threat.

Cloaked in the disguise of a corporate insider, the spy penetrates the outer perimeter, slips past the lurking guardians, cracks the interior vault, loots the corporate secrets—and then turns off the computer and gets another coffee after the high-technology heist. In today’s age of rampant cyber espionage, bet-the-company secrets and billion-dollar technology may be stolen in seconds or exfiltrated for months before detection. And this threat is here and now—and huge...

A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date.

Several security researchers and Western intelligence officers say they believe the malware, widely known as Turla, is the work of the Russian government and linked to the same software used to launch a massive breach on the US military uncovered in 2008.

WASHINGTON — The director of national intelligence acknowledged Tuesday that nearly a year after the contractor Edward J. Snowden “scraped” highly classified documents from the National Security Agency’s networks, the technology was not yet fully in place to prevent another insider from stealing top-secret data on a similarly large scale.

Whitehall officials are believed to have scrapped technology used in meetings amid fears they are being used by the Chinese government to eavesdrop.

The Home Office, Ministry of Justice and Crown Prosecution Service are all said to have stopped using equipment manufactured by telecom giants Huawei.

The Chinese IT company, which was founded by a former Red Army chief, has already been accused of having too much access, as it is signed up to a number of lucrative contracts in Britain.

The NSA has a secret unit that produces special equipment ranging from spyware for computers and cell phones to listening posts and USB sticks that work as bugging devices. Here are some excerpts from the intelligence agency's own catalog.

The Security Service of Ukraine, the nation’s intelligence agency, has its white mini-van back, courtesy of the Berkut anti-riot police officers.
Demonstrators seized the van during a protest rally on the evening of Nov. 25, suspecting that it contained sophisticated equipment for eavesdropping on telephone conversations of protest leaders.
The taking of the van prompted clashes last night between police and protesters. After a 30-minute standoff, punctuated by fighting, the demonstrators recovered evidence from the van and the police reclaimed it.

Pages

2016 Sponsors & Exhibitors

2016 Conference Sponsors

(Evening Reception Sponsor 09/09/2016)

Manufacturers of the ORION 2.4 HX NLJD; VPC 2.0 Video Pole Camera; OSCOR Green Spectrum Analyzer; TALAN Telephone and Line Analyzer.


2016 Conference Exhibitors

 

Developers of Kestrel TSCM Professional Software and providers of Technical Security Specialist Training.


USA Bugsweeps

 

USA Bugsweeps.com introduces a national advertising co-operative program to share national leads developed by radio and print advertising with protected territories.


BV Systems

 

BVS designs and manufactures wireless cell phone detection devices for TSCM, law enforcement, government and military security personnel around the world. 

 


Vector Tech

Elite TSCM Services and Secure Mobile Device Storage Solutions.

 


For information about Corporate Sponsorship, Exhibiting and Advertising opportunities, click here
 
For the Corporate Sponsorship, Exhibitor and Advertising form, click here
 
Press contact: lml@erii.org