Cell Phone Detection: How it Works and Why it’s Important for Your Facility

Ensuring the safety and security of facilities and businesses can be a challenging task, especially when it comes to preventing cell phones from being brought into the building. With nearly everyone owning a mobile device, it has become easy to conceal them and bypass conventional security measures. It is even possible to dismantle a phone, … Read more

International Mobile Subscriber Identity (IMSI): What is it and How Safe is it?

Subscriber identity modules, commonly known as SIM cards, hold significant information about your phone and mobile plan. They allow you to switch phones easily and quickly. The IMSI, or international mobile subscriber identity, is one of the most critical pieces of information stored on your SIM card. While the IMSI may not be important to … Read more

Safeguard Your Property and Assets with Drone Detection Systems

With the increasing popularity of drones and their increasing availability, it has become more crucial than ever to safeguard your organization or home from unwanted drone intrusions. Drone spying is a serious threat that can compromise your privacy and security. Fortunately, there are several drone detection technologies available that can help you protect your property … Read more

Wiretapping: Definition and Legality

Wiretapping is a common practice used by law enforcement and government officials to intercept and listen in on wire, oral, or electronic communications. It is often used as a means of gathering evidence for criminal investigations and trials. However, the legality of wiretapping has a long and debated history. There are laws in place that … Read more

US Phone Tracking Company Showcased Surveillance Capabilities by Spying on CIA and NSA

According to reports, Anomaly Six, a government contractor operating in secrecy, purports to have the ability to track billions of mobile devices across the globe and expose the identity of spies with the mere touch of a button.     Two American start-ups, Anomaly Six and Zignal Labs, reportedly met several months before Russia’s invasion … Read more

Are LinkNYC Internet Kiosks in New York City Monitoring Your Movement?

Exposed code found online indicates that LinkNYC may be preparing to monitor the movements of its users.     Since their introduction in early 2016, LinkNYC kiosks have become a familiar part of the New York City landscape, with over 1,600 towering nine-and-a-half-foot structures installed across the city. These kiosks feature double-sided screens displaying advertisements … Read more

Why Elon Musk’s Starlink is Unlikely to Solve Internet Censorship in Iran

While it’s unlikely that satellite internet technology, such as Elon Musk’s Starlink, will be able to connect Iranian protesters, Musk has already received a PR boost with a simple two-word tweet.     Elon Musk has once again claimed that his business interests can resolve a high-profile crisis, this time suggesting that Starlink satellite internet … Read more

Obscure yet potent: Mobile phone surveillance tool in operation nationwide

CellHawk is a tool utilized by law enforcement to process and visualize vast amounts of data obtained from cellular towers and providers. Its advanced capabilities enable law enforcement to more effectively utilize the information collected.     For years, Hawk Analytics and its powerful mobile phone surveillance tool, CellHawk, have operated largely unnoticed by the … Read more

Police Warn of White Supremacists and Conspiracy Theorists Targeting Cell Towers

According to an intelligence report by the NYPD, extremist organizations collaborated to attack crucial infrastructure and spread terror in the days following the election.     The Biden administration’s focus on repairing the country’s infrastructure has unveiled a new issue: the targeting of critical infrastructure by conspiracy theorists. The New York Police Department’s intelligence report, … Read more

Preventing Government Surveillance of Protester Phone Activity

To safeguard against government surveillance of protester phone activity, a recommended approach is to use the secure messaging app Signal and implement a PIN code for the SIM card on the phone. By utilizing Signal’s end-to-end encryption, messages and calls exchanged through the app will be protected from interception. Adding a PIN code to the … Read more