Ivor Ichikowitz AFRICA / CENTRAL ASIA / MIDDLE EAST Published on 07/09/2016 Ivor Ichikowitz, the worldwide connections of the South African arms magnate Free
Norman-Lamont IRAN / UNITED KINGDOM Published on 17/02/2016 Norman Lamont, pillar of the British-Iranian business community
UNITED STATES 15/05/2013 Dark Drive goes on the defensive…and offensive A US start-up is developing a USB key that can protect its own contents - while infecting a PC. [...]
UNITED STATES 24/04/2013 Ultimara works on successor to optronic pod A California start-up is developing an ultra-slim miniature sensor designed to replace the US Army’s bulky optical and infra-red cameras. [...]
UNITED STATES 10/04/2013 STIX: Washington's guide to global malware The Obama administration is setting up a collaborative programme for the detection and analysis of sophisticated computer attacks. [...]
EUROPE 27/03/2013 Fibre optic interception gets easier, industrialises Once, only the intelligence services could intercept data transmitted by fibre-optic cable but the technology is now easy to come by. [...]
UNITED STATES 13/03/2013 Honeymoon over between DARPA and hackers The Cyber Fast Track programme, which made bedfellows of the US Army and computer hackers, will end in a few months’ time. [...]
UNITED KINGDOM FRANCE 27/02/2013 Nations quietly battle over merchant ship geolocation The US has access to LRIT data on three quarters of the world’s merchant shipping, much to the displeasure of some countries. [...]
FRANCE 13/02/2013 Diades software locates real pirates Coast guard services and shipping companies now have access to ‘anti-pirate’ radar technology developed for the French Navy. [...]
CHINA 30/01/2013 Chinese interception champ dons new cloak Although it was sold to quell US lawmakers’ concerns, China’s ZTESec still has ties with its former parent company - and the Chinese state. [...]
UNITED STATES UNITED KINGDOM 16/01/2013 USB key foils cyber-investigators A hacker has invented a prototype USB key that self-destructs when examined in a police computer laboratory. [...]
UNITED STATES 02/01/2013 Investigators crack draft e-mail communications The FBI’s probe into CIA chief David Petraeus extra-marital affair revealed that even draft e-mails can be hacked into. [...]
UNITED STATES 12/12/2012 Primordial takes US Army off beaten track New mapping software enables soldiers to find not only the shortest but also the safest off-road route from A to B. [...]
UNITED STATES 28/11/2012 US Army funds detection of switched-off radios A technology company is developing an algorithm that can detect radio antennae in aerial or satellite photographs. [...]
GERMANY UNITED STATES 14/11/2012 Motor-glider makes discreet intelligence tool ShadowAir's lightweight, low-cost and silent spy aircraft are challenging costlier options. [...]
FRANCE RUSSIA 31/10/2012 iPown: the iPhone dock with a malicious streak The mobile phone docks that are becoming standard issue in hotel rooms provide a ready way to hack into someone's iPhone. [...]
AUSTRALIA 17/10/2012 Oz tool could revolutionise fibre optic interception A clever new probe makes fibre optic interception possible without distorting or breaking data transmission. [...]
UNITED STATES 03/10/2012 PCSS wreaks GPS infrastructure havoc A remote device that can cause crashes and deregulate critical infrastructure is revolutionising attacks against civil GPS systems. [...]
UNITED STATES 19/09/2012 Hackers crack satphone codes Hackers have finally gotten round the encryption protocols used by the likes of Thuraya and Inmarsat. [...]
UNITED STATES 05/09/2012 RadioMap takes signal intelligence to next level The Pentagon is developing technology to geo-locate radios, GSM antennae and WIFI spots in real time - using ordinary tactical radios. [...]
UNITED STATES 22/08/2012 IARPA works on high-frequency radio geo-location The U.S. Army may soon be able to pinpoint the whereabouts of enemy radios - by searching the ionosphere. [...]
UNITED STATES 18/07/2012 In radio waves war, US Army trails behind hackers DARPA is developing a system that can be transformed into any radio device - but hackers got there first. [...]