New Surveillance and Encryption Rules After the European Parliament Elections The European Union (EU) is planning to implement draconian new mass surveillance rules soon after Sunday’s European Parliament elections, an EP insider warns after the plans emerged online. Secret Documents Reveal EU Plans The documents, from the EU Commission, reveal
Category: Countersurveillance
Countersurveillance investigations include all verification activities aimed at verifying and detecting whether you are being monitored by someone.
PTT Mesh Radios by Endoacustica Europe: Revolutionizing Communication in Critical Situations
In the world of advanced technology and digital communications, Endoacustica Europe’s PTT Mesh radios (Push-To-Talk) stand out as a groundbreaking solution across various critical sectors. These sectors include military, security, emergency management, law enforcement, covert surveillance, industrial and construction settings, maritime navigation, large-scale events, and mining operations. The radios’ distinctive
Clusit warns: dangerous escalation of cyber attacks all over the world!
In the newest 2018 report of Clusit, the Italian Association dealing with information security, it appears a really worrying state of affairs: between 2011 and 2017 have been occurred almost 7,000 serious cyber attacks all over the world, 1,100 of which only in the past year. Furthermore, also in 2017,
Cryptocurrency: beware of mobile security threats!
The past year has been one of the worst ever affected by mobile piracy, especially in financial and cryptocurrency fields. Well, no wonder, cause the creation of new financial products is often accompanied by frauding behaviour. A new survey can help us understand the emerging “cybercrime” phenomenon According to a
How to protect your smartphone from being tapped using encryption tools
How can you protect your own privacy on smartphone or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we
Protect yourself from illegal cell phone tapping!
If you are used to networking in search of easy solutions against the unauthorized cell phone tapping issue, you may be disappointed. Just like that, because the overwhelming problem of phone privacy, especially that one concerning mobile networks, has long since exceeded the limits, so much to induce public opinion
No annoying cell phones, thanks to a handkerchief
For once, since it’s Friday and the weekend is coming, we want to allow us a little “light” diversion, talking about an item which, more than having a true utility function, has a “diplomatic” one, so to speak. How Can a Handkerchief Be a Frequency Jammer? It is called Phone
Defense from wiretapping? You don’t need a law
Protection against telephone interception and wiretapping , that the Italian government would like to delegate to what looks more like a way to prevent police forces and judiciary from using it in investigation, does not need a legislative shortcut, but with a bit of salt and a relatively low expense,
The new Untraceable cell phones, against unwelcome listeners
Untraceable cell phones can serve many purposes. Even though all the song and dance that we are witnessing in Italy about the law that would regulate (that is, limit) the usage of telephone wiretapping would only benefit a few people who would want their dirty business to remain secret, it
Bug sweeping, to keep your conversations secure
Bug Sweeping? When in your workplace or office you are discussing important business strategies or information, last any level, secrecy is a vital factor, especially if one of the keys to success is being faster than your competitors. Therefore, it is essential that any information exchanged during a decision-making meeting