One of the most valuable tools in our TSCM (Technical Surveillance Counter Measures) threat detection arsenal
Find out why the HackHunter Pursuit WiFi tracker is one of Jayde Consulting’s most valuable threat detection tools according to Julian Claxton: “HackHunter’s Pursuit is now one of the most valuable tools in our threat detection arsenal. As a professional technical surveillance countermeasures firm, we need to ensure we are capturing and analysing all radio […]
The HackHunter Pursuit WiFi tracker is a “lifesaver” in Cyber Technical Surveillance Counter Measures sweeps according to Valkyrie (GB) Limited (posted on LinkedIn): “Today VALKYRIE (GB) LIMITED conducted an early morning CTSCM (Cyber Technical Surveillance and Counter Measures) Inspection. Our long-standing client asked us to do a CTSCM on their private residence in London. The […]
Insurance companies, as members of the finance industry, are required to comply with the Payment Card Industry Data Security Standard (PCI-DSS) which requires quarterly WiFi audits to detect unauthorized WiFi (rogue access points), locate and remove them. Their Existing Method The Insurance company used their WiFi routers to detect unauthorized WiFi and alert the security […]
Technical Surveillance Counter-Measure (TSCM) companies specialize in locating and removing “bugs” to counter surveillance and espionage. Many of the “bugs”, including listening devices and hidden cameras, use wireless communication technologies such as WiFi. Their Existing Method A commonly used Spectrum Analyzer is used to locate WiFi in the premises being swept. The Trial The TSCM […]
Many organizations have a “no hotspot” policy for their staff, where creating a WiFi access point or “hotspot” with their phone is banned to stop staff circumventing corporate security. A Government department used the HackHunter Pursuit to find mobile hotspots in the office. Their Existing Method Visual audit. The Trial The HackHunter Pursuit was used […]
Prisons are increasingly concerned about contraband being thrown over the fence. Criminals hollow out tennis balls, footballs and even squash balls, and fill them with drugs, cigarettes, money, phones, sim cards, razor blades – whatever will fit – and throw them over the prison fence for inmates inside to recover. For example, in May 2020 […]
Organizations in the defence, government and law enforcement industries operate secure areas where all portable electronic devices are prohibited, including data centers. This manages the risk of eavesdropping or security compromise. These organizations need to locate WiFi which should not be in their environment (unauthorized WiFi) and investigate it to see if it should be […]
What’s the point of looking at data when the event’s already happened? And yet common WiFi security tools only analyze records after the event has passed.
Did you know that microwaves and routers look the same to an RF analyser because they “both operate on 2.4GHz WiFi”? This is just one of the reasons that WiFi protocol analysis beats RF analysis hands down.
During a floor walk with their internal WiFi specialists we put our Pursuit WiFi tracker to the test, and found that we were over 300% more effective than their existing solution for rogue access point and WiFi audits