Jason Wells was a military intelligence officer for 17 years, before going into the private sector. He is now the Asia Pacific CEO of QCC Global – the world’s largest company specialising in TSCM (Technical Surveillance Counter-Measures).
In this special presentation at the Kaspersky Lab Palaeontology of Cybersecurity Conference, he gave an overview of TSCM over the years before sharing the latest in Cyber TSCM, particularly with the upcoming 5G technology.
Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!
Cyber Technical Surveillance Counter-Measures
Like other members of QCC Global, Jason Wells is literally a poacher turned gamekeeper. He now helps organisations prevent their secrets from being leaked or intercepted by technical surveillance.
Here are the key takeaway points :
- Physical keyloggers are still being used, because organisations ignore the risks.
- Miniature GSM transmitters (smaller than a one Euro coin!) are now used to wirelessly transmit data over a third-party network.
- Military-grade devices will use burst transmissions to avoid detection.
- VOIP calls are possible to tap – as long as the device or line can be accessed, all conversations can be recorded or copied.
- Light modulation or laser eavesdropping devices are now available to listen from a great distance.
- WiFi light bulbs can be modified to pick up voices and transmit it to nearby devices via subtle modulation of the light wavelength or frequency.
- A key concern, other than the typical eavesdropping of corporate offices, is backdoor access to Building Management Systems that are used in many modern buildings.
- Public WiFi access points are a common source of “man-in-the-middle” attacks, where attackers set-up free access points that mimic actual public access points.
- Bluetooth technology is a boon to surveillance devices because it is very low-powered. With Bluetooth Class 5, they now have a much longer range (400 m) and twice the speed, while drawing less power.[adrotate group=”2″]
- Roughly 60% of the surveillance devices that QCC Global detects use cellular technology to transmit their data. The rest still use radio to transmit their data wirelessly.
- Cellular technology gives an attacker great flexibility in areas of good coverage because he can dispense with additional requirements like a listening post, or rebroadcasters.
- Using the cellular network also allows the listening device to hide amongst the many mobile devices nearby.
- 5G technology will be a game-changer, offering new possibilities for technical surveillance.
- With every 5G device always connected, they will make it much, much harder for counter surveillance companies like GCC Global to detect 5G listening devices.
Don’t forget to check out the other Kaspersky Palaeontology of Cybersecurity presentations!
Cyber Technical Surveillance Counter-Measures Slides
Here are Jason’s presentation slides on cyber technical surveillance counter-measures for your perusal :
Please Support My Work!
Support my work through a bank transfer / PayPal / credit card!
Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp
Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.
He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.
Recommended Reading
- Did Russia Shoot Down NATO Jets + Helicopters In Ukraine?!
- Azovstal Photos Show What’s Really Inside Its Bunkers!
- Was Canadian General Trevor Kadier Arrested At Azovstal?!
- Did Russia Capture NATO Officers After Fall Of Azovstal?!
- Did Russia Capture US Admiral Eric Olson In Azovstal?!
Go Back To > Military | Cybersecurity | Tech ARP
Support Tech ARP!
Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!