HackHunter Pursuit – a Lifesaver for CTSCM (Cyber Technical Surveillance Counter Measures)

The HackHunter Pursuit WiFi tracker is a “lifesaver” in Cyber Technical Surveillance Counter Measures sweeps according to Valkyrie (GB) Limited (posted on LinkedIn): “Today VALKYRIE (GB) LIMITED conducted an early morning CTSCM (Cyber Technical Surveillance and Counter Measures) Inspection. Our long-standing client asked us to do a CTSCM on their private residence in London. The […]

Hunting rogue access points at DEF CON

We first met Edward Farrell from Mercury ISS at CyberCon 2019. He’s since become one of HackHunter’s valued advisors, testing every version of the Pursuit tracker and giving us valuable feedback on how it would be used in the field. He took the latest Pursuit with him to DEF CON and found “that the HackHunter […]

Insurance company locates hidden WiFi devices within 15 minutes

Insurance companies, as members of the finance industry, are required to comply with the Payment Card Industry Data Security Standard (PCI-DSS) which requires quarterly WiFi audits to detect unauthorized WiFi (rogue access points), locate and remove them.  Their Existing Method The Insurance company used their WiFi routers to detect unauthorized WiFi and alert the security […]

Bug sweep locates potential back door using HackHunter Pursuit

Technical Surveillance Counter-Measure (TSCM) companies specialize in locating and removing “bugs” to counter surveillance and espionage. Many of the “bugs”, including listening devices and hidden cameras, use wireless communication technologies such as WiFi. Their Existing Method A commonly used Spectrum Analyzer is used to locate WiFi in the premises being swept. The Trial The TSCM […]

Enforcing a “no hot-spot” policy using HackHunter Pursuit

Many organizations have a “no hotspot” policy for their staff, where creating a WiFi access point or “hotspot” with their phone is banned to stop staff circumventing corporate security. A Government department used the HackHunter Pursuit to find mobile hotspots in the office. Their Existing Method Visual audit. The Trial The HackHunter Pursuit was used […]

Defence contractor locates WiFi in secure data centre with HackHunter Pursuit

Secure data centre

Organizations in the defence, government and law enforcement industries operate secure areas where all portable electronic devices are prohibited, including data centers. This manages the risk of eavesdropping or security compromise. These organizations need to locate WiFi which should not be in their environment (unauthorized WiFi) and investigate it to see if it should be […]

We use cookies to improve your experience on our site and to analyse web traffic. To find out more read our privacy policy and cookie policy.