Corporate Espionage and Technical Surveillance Counter Measures (TSCM)




- Feb 8
- 2 min
SOCMINT - The Benefits And Challenges Of Social Media - Part II


- Jan 17
- 3 min
SOCMINT - The Benefits And Challenges Of Social Media - Part I


- Dec 19, 2022
- 3 min
When Seeing (And Hearing) Isn’t Believing: Deep Fakes & Digital Deception – Part II


- Nov 9, 2022
- 3 min
When Seeing (And Hearing) Isn’t Believing: Deep Fakes & Digital Deception – Part I


- Apr 27, 2022
- 1 min
Digital Shorts: Online Red-Teaming


- Apr 19, 2022
- 2 min
Digital Shorts: Digital Data Risk


- Oct 27, 2021
- 5 min
Insights from an Intern: A Digital Security Toolkit


- Sep 8, 2021
- 4 min
Does a picture paint a thousand words?


- Apr 20, 2021
- 3 min
The Truth Behind "Active Monitoring"...


- Mar 16, 2021
- 3 min
Mythbusting - Physical Surveillance 101


- Mar 5, 2021
- 5 min
Crisis Management – setting the foundations for decision advantage


- Feb 15, 2021
- 3 min
Virtual Machines & Virtual Private Networks – Unlocking the mystery of why…


- Jan 28, 2021
- 4 min
Online Monitoring Part 2 – Analytical value and automation...


- Jan 18, 2021
- 3 min
The Reality of Theory – How can we use intelligence analysis models more creatively?


- Jan 5, 2021
- 3 min
Beyond OSINT - Scraping and more...


- Jan 5, 2021
- 4 min
Social Engineering – Why information security matters. Is Alexei Navalny a genius?


- Dec 22, 2020
- 3 min
Online Monitoring Part 1– why do we need it & how does it work?