Category: Cyber-Intelligence

London: Who will you meet on Security & Counter Terror Expo 3-4 May?


For over 9 years Security & Counter Terror Expo has consistently attracted the most senior public & private sector security professionals. As an exhibitor you will meet the people making serious decisions and shaping the future of the industry.

Meet attendees from:

Law Enforcement

Law Enforcement

  • Police
  • Intelligence services
  • Prisons/Offender Management
  • Specialist Operations

Military

Military

  • EOD
  • MoD
  • Army
  • Navy
  • Air

Transport & Borders

Transport & Borders

  • Aviation
  • Border
  • Rail
  • Maritime
  • Supply Chain
  • Customs
  • Public Transport

Government

Government

  • National
  • Local
  • Home Office
  • Cabinet Office
  • Embassies

Emergency Services

Emergency Services

  • Police
  • Ambulance
  • Fire & Rescue

Critical National Infrastructure

Critical National Infrastructure

  • Utilities
  • Water
  • Communications
  • Energy
  • Food
  • Transport
  • Healthcare
  • Finance
  • Chemicals

Private Sector

Private Sector

  • Retail
  • Finance/Banking
  • Architects
  • Hotels
  • Venues
  • Corporate
  • Insurance
  • Construction

Major Events

Major Events

  • Olympics / Major Games
  • Sports Stadia
  • Concert / Festivals
  • Political Summits

100+ Countries

In 2016 attendees came from over 100 countries. If you want to meet hard-to-reach senior attendees from across the globe then Security & Counter Terror Expo is the event for you.

Contact us to find out more information

Post-Show Report

Post-Show Report

London: The following companies will be exhibiting at Security & Counter Terror Expo 2017


  • SCTX Logo

    360 Immersive

    Stand: 2-D42
  • 3DX-Ray Ltd

    Stand: F61
  • 5 Stones intelligence

    Stand: E37
  • AARONIA AB

    Stand: B50
  • Abloy UK

    Stand: B65a
  • Adani Limited

    Stand: I55
  • Aerialtronics

    Stand: B80
  • Alford Technologies

    Stand: F35
  • Ansell Protective Solutions AB

    Stand: B31
  • Apex Security Furniture LTD

    Stand: E65
  • Applied Satellite Technology Systems Ltd

    Stand: L40
  • Arab Defence Journal / World Security Index

    Stand: F03
  • Area Systems UK ltd

    Stand: C61
  • ASIS International UK Chapter

    Stand: H81
  • ASL group

    Stand: G41
  • ATG Access

    Stand: E56
  • Audax Global Solutions Ltd

    Stand: L65
  • Audiotel-international

    Stand: F1
    Audiotel International is a leading global provider of Covert Audio Surveillance, Technical Counter Surveillance and Counter IED Solutions We have many years experience in the design, development and delivery of high power specialist search technology and offers a range of a …
  • Auggmed

    Stand: I40
    The aim of AUGGMED is to develop a serious game platform to enable single- and team-based training of end-users with different levels of expertise from different organisations responding to terrorist and organised crime threats. Test your skills against terrorist threats in …
  • Avon Protection

    Stand: G30
  • Axxess Identification

    Stand: D72
  • B.E.S.T Police Training

    Stand: E5
  • BAE Systems

    Stand: I32
  • Bastion Security Products

    Stand: B70
  • BenweldSecure Limited

    Stand: H70
  • Blizzard Protection Systems Ltd

    Stand: 2-A62
  • Blok N Mesh UK Ltd

    Stand: F40
  • BMS Inc

    Stand: B23
  • Border Force

    Stand: H5
  • Bradbury Group Ltd

    Stand: E61
  • BRISTORM

    Stand: J80
  • Capewell Aerial Systems LLC

    Stand: F5
  • Carillion Communications

    Stand: K40
  • Cascade Protection Systems

    Stand: G81
    Cascade Protection Systems is committed to protecting lives and property from man-made and natural catastrophes through its state-of-the-art blast mitigation technologies. There have been no truly innovative developments in blast mitigation technologies in recent years, unti …
  • CBNW Magazine

    Stand: I85
  • CCM Defence and Security

    Stand: A40
  • CEA

    Stand: D84
  • Chemring Technology Solutions LTD

    Stand: E30
  • Chenega Corporation

    Stand: D22
  • Chorus Intelligence Limited

    Stand: J25
  • Chronos Technology

    Stand: E35
  • Chubb Systems LTD

    Stand: I80
  • City Security Magazine & CoLCPA

    Stand: E04
  • Cobalt Light Systems

    Stand: A20
  • Cogia Gmbh

    Stand: J20
  • Counter IED

    Stand: F7
  • Counter IED UK

    Stand: G5
    Delivering integrated solutions based on British excellence to counter the IED threat. Representing the UK’s Counter-IED supply chain and collaborating with Her Majesty’s Government, British Army and security forces, Counter-IED UK delivers integrated solutions to enable par …
  • Counter Terror Business

    Stand: L20
  • Countermeasure Systems Ltd

    Stand: D63
  • Crisis Response Journal

    Stand: J85
  • Crowded Places

    Stand: D40
  • Daniel Technologies Ltd

    Stand: D64
  • Dataminr

    Stand: F81
  • Delta Business Media

    Stand: E02
  • Detect Inc

    Stand: J83
  • Diametrex Ltd

    Stand: F80
  • Document Awareness

    Stand: D40
  • dormakaba

    Stand: J70
  • DPM Drone Division

    Stand: H30
  • DSA Detection

    Stand: G7
    DSA Detection are the world’s largest manufacturer and supplier of Trace Detection consumables for Explosive Trace Detection systems and IED Simulation products. With TSA, DfT, STAC and other European organisational approvals we supply sampling media to over 600 airports glo …
  • EFAPROTECT

    Stand: B30
  • Elistair

    Stand: D89
  • Emergency Planning Society

    Stand: 2-C42
  • Emergency Protection Limited

    Stand: G24
  • Endeavor Robotics

    Stand: D30
  • Energetics Technology Ltd

    Stand: B24
  • EPC – Groupe

    Stand: C60
  • Eskan Electronics

    Stand: H12
  • Exmesh

    Stand: G60
  • EXPLORER CASES by GT Line

    Stand: F70
  • FALCON

    Stand: c12
    Project Genesius is an initiative between law enforcement and the secure printing industry. It’s aim is to prevent the creation of counterfeit identity documents. Visit us to see a selection of genuine and counterfeit documents. Can you tell the difference? .
  • Felix Fund (EOD Warrior)

    Stand: G9
  • First Tactical

    Stand: K65
  • FLIR Systems

    Stand: E41
  • Frontier Pitts

    Stand: D65
  • G Glentos SA – Kibo Cabins

    Stand: E55
  • Galliford Try Infrastructure Security

    Stand: K51
  • Garrett Metal Detectors

    Stand: I33
  • Genalog Limited

    Stand: F60
  • Genetec Europe

    Stand: F50
  • Geoquip Worldwide

    Stand: H55
    Geoquip are a global leader in quality perimeter fence security, protecting everything from prisons to the crown jewels, we have earned a reputation for quality and innovation. Our diverse products are sold around the world. We are pioneers in the design, development and man …
  • Gibraltar

    Stand: C62
  • Gilgen Door Systems

    Stand: G71
  • Glass and Glazing Federation

    Stand: I-20
  • GMK Ltd

    Stand: C11
  • Green Light Ltd

    Stand: B67
    Green Light is a global provider of security training and consultancy services. Green Light has a versatile and highly qualified team of consultants, each one being an expert in their given speciality within the transportation safety and security arena.
  • Heald Ltd

    Stand: K55
  • HERAS

    Stand: H60
    Heras UK Fencing Systems is a leading UK manufacturer of permanent fencing, railings and gates. We manufacture and distribute a range of permanent fencing and gate systems ideal for all housing environments, parks and playgrounds, sports facilities commercial and high securi …
  • HGV

    Stand: D40
  • HGV

    Stand: D40
  • HIKVISION

    Stand: E45
  • Honda

    Stand: I30
  • Hytec Inter Co Ltd

    Stand: G85
  • ICOR Technology

    Stand: C13
  • IDscan Biometrics Limited

    Stand: D21
    IDscan reads, extracts data from and authenticates a multitude of complex documents including passports, visas, ID cards, driving licenses, utility bills and work permits. Using images captured from sophisticated passport scanners IDscan’s advanced technology fully authentic …
  • Ilasco / Keela

    Stand: C37
  • Informa

    Stand: B15
  • Information Systems Security Association

    Stand: H91
  • Institute of Explosives Engineers

    Stand: G20
  • Integrated Design Ltd

    Stand: E36
  • International Professional Security Association

    Stand: I95
  • Intersec

    Stand: E03
  • Intsec Ltd

    Stand: J32
  • ISMI Certification Ltd

    Stand: H93
  • ISS Global

    Stand: B10
  • ISSEE

    Stand: C36
  • iStorage Ltd

    Stand: J30
  • JCPX Development

    Stand: D86
  • Jolly Safety Equipment

    Stand: G35
  • JSaRC

    Stand: L60
    The Joint Security and Resilience Centre (JSaRC) is a 50-50 collaboration between the Home Office and the UK security sector. We remove barriers by better linking government and sector, allowing us to match security requirements with the best solutions, always ensuring trans …
  • K9 electronics LTD

    Stand: H16
  • Karenswood (International) Ltd

    Stand: G36
  • KBC Networks Ltd.

    Stand: L35
  • Keysight Technologies

    Stand: E80
  • Kingsley Plastics Ltd

    Stand: E71
  • LawMate

    Stand: K60
  • Lincoln Security

    Stand: C82
  • Locken UK

    Stand: F66
  • Logos Imaging LLC

    Stand: H45
  • LPCB (Bre Global)

    Stand: E70
  • LUKAS Hydraulik GmbH

    Stand: F20
  • Lyon Equipment

    Stand: F72
  • Maple Fleet Services

    Stand: H75
  • Maritime Inflatable Solutions Ltd

    Stand: L41
  • MAS Zengrange

    Stand: C70
  • Med-Eng Holdings ULC

    Stand: G25
  • MedTree

    Stand: H70
    MedTree are a specialist distributor in emergency medical supplies. Amongst our vast product range, we are now delighted to be the exclusive distributor for ACT-PAK Personal Aid Kits.  ACT-PAK’s are small, cost-effective, vacuum sealed pouches containing the items required t …
  • MEESONS AI LTD

    Stand: K41
  • Metrasens

    Stand: D85
  • MIB Electronic Ltd

    Stand: G22
  • Mico Tindall Engineering

    Stand: D74
  • Microdrones Gmbh

    Stand: E81
  • Monch

    Stand: I91
  • Morgan Marine Ltd

    Stand: F71
  • Morse Watchmans

    Stand: H42
  • Nanuk Cases UK

    Stand: E40
  • National Barriers

    Stand: D40
  • National Police Chiefs Council

    Stand: D40
    To be confirmed
  • NBC SYS

    Stand: D84
    PROVIDING CBRN SOLUTIONS IS OUR COMMITMENT
  • NDI Recognition Systems

    Stand: G80
  • Nexter Robotics

    Stand: A10
  • NIC Instruments Ltd

    Stand: K50
  • Nightsearcher Ltd

    Stand: E22
  • Novo DR ltd

    Stand: C35
  • Optim LLC

    Stand: C23
  • oVio Technologies, Inc.

    Stand: B20
  • PA Consulting

    Stand: L30
    PA is a consulting, technology and innovation firm. We define success as achieving exceptional results that have a lasting impact on businesses, communities and individuals worldwide. Our clients choose us because we don’t just believe in making a difference. We believe in m …
  • PDR

    Stand: G70
  • Pelco by Schneider Electric

    Stand: J65
    Pelco by Schneider Electric understands that information is critical to success, which is why we are singularly focused on the development of video surveillance and security solutions that provide you the information necessary to make real-time, business-enabling decisions.
  • Pinnacle Response Ltd

    • PITAGONE Sa-Nv

      Stand: B32
    • Project Griffin

      Stand: D40
    • PSSA: Perimeter Security Suppliers Association’

      Stand: K61
    • QinetiQ North America

      Stand: F82
    • Quantum Aviation Ltd

      Stand: G40
    • R&D Sheetmetal Ltd

      Stand: F55
    • RFA Security Services Ltd

      Stand: D34
      RFA Security Services Ltd provides a range of security services which includes Explosive Detection Dogs and Sniffer Dogs to a diverse client portfolio utilising the skills and training received by former Military and Police service personnel.  We are a highly professional, f …
    • RFID Secure Ltd

      Stand: D20
    • Rheinmetall

      Stand: E82
    • Run, Hide, Tell

      Stand: D40
    • RUSI

      Stand: H76
    • Safetell Limited

      Stand: G55
    • Safetyflex Barriers

      Stand: I36
    • Salzer GmBH

      Stand: E24
    • Scanna MSC Ltd

      Stand: D32
    • SDS Group Ltd/Vidisco

      Stand: G8
    • Securablinds

      Stand: I31
    • Securiclad

      Stand: D70
    • Security Cleared Jobs.com

      Stand: L30
    • Security News Desk

      Stand: E01
    • Selectaglaze Ltd

      Stand: E64
    • Senstar Ltd

      Stand: D76
    • Shephard Media

      Stand: L31
    • Silent Sentinel Limited

      Stand: F85
    • Sodexo

      Stand: N/A
    • Sodexo

      Stand: TBC
      Our positioning in the services industry is original and unique. It is what makes our brand different. In combining the diverse talents of our teams, Sodexo is the only company to integrate a complete offer of innovative services, based on over 100 professions. We have an un …
    • Soliton Systems

      Stand: J31
    • Stafford Bridge Doors Ltd

      Stand: H40
    • Strategic Agenda

      Stand: G61
    • Stratom Inc

      Stand: H14
    • Stuart J Green Digital Engineering

      Stand: I50
    • Surelock McGill Ltd

      Stand: G45
    • Tactical Electronics

      Stand: C22
    • Teledyne e2v

      Stand: E50
    • Teledyne ICM

      Stand: K71
    • Telerob Gesellschaft fur Fernhantierungstechnik mbH

      Stand: E60
    • Terrafix Ltd

      Stand: F30
    • The Aerial Academy

      Stand: C80
    • The Security Institute

      Stand: L25
    • Time Data Security LTD

      Stand: I56
      With over 25 years experience, TDS (Time Data Security) Ltd. is committed to the development of innovative, future proof secure access solutions.
    • Traka

      Stand: B65
    • UKKIOSKS

      Stand: J81
    • University College London

      Stand: E20
    • University of Salford

      Stand: D75
    • Universtiy of Warwick

      Stand: G73
    • Uplift Drone Training LTD

      Stand: F2
    • Vessel Arrest Systems

      Stand: B1
    • Woodway Engineering LTD

      Stand: C9
    • Yuneec UK

      Stand: B40
    • Zaun

      Stand: J50
    • Zepcam

      Stand: L50

      Interesting in exhibiting?

London: Meet the professionals shaping national security 3-4 May


For nearly a decade Security & Counter Terror Expo has been the place were security professionals come to make decisions that shape national security and protect the world’s largest organisations.

It has a proven track record of delivering 1,000s of international attendees looking to secure the assets, sites and people they are tasked with protecting. These attendees come to specify the latest products and solutions and make significant procurement decisions.

10,000+ Attendees

100+ Countries Represented

800+ VIPs

350+ Exhibitors

78%
Of attendees have direct or influence in purchasing

82%
Of Attendees will make procurement decisions based on what they have seen

85%
Of exhibitors rated SCTX as an excellent event

“Security & Counter Terror Expo 2016 was brilliant for us. We are a first time exhibitor and the volume of high profile people visiting our stand was exceptional. Overall, this has been a fantastic event, with exceptional visitors – we will definitely return.”  Adam Liardet, Audax

Event Brochure

Download the SCTX Event Brochure for a full overview of who you will meet and the opportunities for your business at SCTX

Exhibit at Security & Counter Terror Expo
Download

Why Exhibit?

  • Establish your brand as a major force in the market
  • Network with and influence industry thought leaders
  • Launch new products and services on an international stage
  • Explore opportunities in other markets
  • Generate new leads & enquiries

Find out more here

Supported by the Home Office

Security & Counter Terror Expo is fully supported by the Home Office and aligned with their security strategy. Home Office

Find out more here

Become an exhibitor

2016 was our first time at Security & Counter Terror Expo. The event was recommended to me by a colleague and if the return on interest comes in this could be the best show we have ever exhibited at. It was extremely busy, so busy in fact that I had run out of business cards by lunchtime on the final day. We will be returning next year. Ed Mayne, UK Manager, Lawmate

Source:https://www.counterterrorexpo.com/exhibiting/why-exhibit

By

Robert Williams

Editor in Chief

Security&Counter Terror News


  • Harper Chalice Group is pleased to announce that we are now an Employee Owned Company

  • Tactical Electronics launched its most advance line of tactical inspection cameras today at Warrior West in San Diego, CA. The new CORE Camera line features Wireless, High Definition, Digitally Encrypted Cameras and Monitors.

  • Metrasens is honoured to have won The Queen’s Award for Enterprise in the category of International Trade, the UK’s most prestigious award for business success. The company has been recognized for its work in international trade, which represents 95% of total revenues and has grown by a total of 400% over the last six years.

  • Award-winning security manufacturer, Heald Ltd, has completed the installation of its revolutionary surface mount sliding bollard solution, the HT2-Matador 3, at the Stavros Niarchos Foundation Cultural Centre in Athens.

  • PITAGONE is a European leader in Threat Management and anti-terror, assisting its clients daily in more than ten Countries from its Brussels headquarters.

     

    UK PREMIERE.

    PITAGONE presents its proprietary anti ramming-trucks mobile barriers for the first time in the UK. Specially engineered to stop trucks up to 20 Tons.

     

    “We serve Europe with 40 years of Israeli Anti-Terror Experience”

     

  • In a volatile and changing threat environment which has seen a rise in extremism and altering attack targets, it is fundamental that protective measures are used to secure both critical national infrastructure and crowded places within the public realm. The latter is a more recent target for extremists and one which is more difficult to protect against due to the sporadic nature of attacks.

  • NORTHWEST FLORIDA BEACHES INTERNATIONAL AIRPORT Installs drone detection & defense system

    11-Apr-2017 by: KatieS@MooreCommGroup.com; helen.lewis@detect-inc.com Detect Inc

    NORTHWEST FLORIDA BEACHES INTERNATIONAL AIRPORT Installs drone detection & defense system

    DroneWatcher system to detect unauthorized drone activity near airport

  • The Vector Shield is a light weight, low profile, arm secured shield that provides ballistic protection to the upper body, face and neck. Designed and patented by a Special Forces Green Beret Medic and West Point Combatives Instructor, it will be showcased for the first time in the UK at the Security & Counter Terror Expo 2017 on the 3rd and 4th May at London Olympia, exclusively on the Emergency Protection Limited stand G24. Vectors are currently being used by law enforcement agencies in departments all across the United States.

  • Daniel Technologies are proudly hosting Flashbang Magazine, the publication behind “Special Units”, an exclusive photographic journey into the world’s most Elite Units at their stand D64.

  • Forcit Defence’s plastic explosive PENO, which is STANAG MIL-SPEC verified, can be transported, stored, and used operationally in extreme climate conditions without affecting malleability and texture of the substance. PENO will be demonstrated at live demo on 2 May. Apply to sales@explosives.net

  • TDS (Time Data Security) Ltd. have been working with Analog Devices with the aim of providing a comprehensive security suite to the new facility in Raheen Business Park, Co. Limerick. The system encompasses all aspect of security from controlling access, to monitoring on-site activity to accounting to individuals in the event of an emergency.

  • Two of the leading names in CCTV, video analytics, biometrics and access control have formalised their partnership at the official UK Government global security event today [7 March 2017].

    Tensor plc has signed an agreement to become EyeLynx Limited’s first official channel partner, under which EyeLynx has completed a bi-directional integration of Tensor’s security and access control solutions into its iconic SharpView video recording and management software.

  • High security perimeter systems manufacturer Zaun Limited is bolstering the ranks of approved installers for its unique super-intruder-resistant fencing.

    ArmaWeave fencing – which is unique to Zaun – is produced on the world’s largest steel loom at the company’s West Midlands manufacturing base.

    Crime & Fire Defence Systems engineers were trained in the installation of the product and have installed kilometres of the high-security woven fencing at utilities sites across the country over the last two years.

  • Airports, schools, casinos, sports stadiums, government office buildings, the national infrastructure and similar sites are all potential targets for terrorism. Among the many ways to mitigate risk an …

  • The multi-purpose steel door was tested in the highest resistance level RC6 of the European standard for forced entry resistance. The door offers additional protection against ballistic attacks (FB7), blast (EXR5 / tested with a charge of 500kg) and fire (BS 476, 120 min / T90).

  • Woodway Engineering is a family owned and run business and has been supplying the Emergency Services for the last 35 years. It is an established supplier of mast systems which are branded under the Night Owl name. These include Night Owl Classic, Night Owl Lite and our most recent product innovation, Night Owl Vision.

    The Night Owl Classic is an industry standard on many UK Fire tenders providing high intensity LED scene lighting.   Woodway is also known for its LED lighting / siren systems and supplies many Police, Fire and Ambulance authorities including London Fire Brigade and London Ambulance Service.

    The Night Owl range of products is manufactured in the United Kingdom.

  • To meet Dublin and Cork’s airports challenging security and operational requirements the DAA turned to security software leader TDS (Time Data Security) Ltd. TDS provided the DAA with the confidence for future proofing and the platform to work with a knowledge-based company to custom build a security solution to meet their unique operational and rigorous industry requirements.

     

  • Zaun Unveils Corrugated 10-minute Fence

    24-Mar-2017 by: Mark Triggs Zaun

    A high-security fence that resists for more than 10 minutes sustained attack with specialist power tools has been developed by steel mesh fencing manufacturer Zaun, set to be unveilled at SCTX 2017.

  • TDS (Time Data Security) Ltd. have successfully implemented an innovative enterprise security suite at the four Stryker facilities in Ireland including the leading pharmaceutical companies latest Surgical Innovation Centre in Co. Cork. The TDS Enterprise Security Suite was selected by Stryker to strengthen their security procedures and provide a more secure and safe working environment

    By
    Robert Williams
    Editor in Chief

London: 3-4 May The education programme at Security & Counter Terror Expo offers high-level insight into current issues and how to combat new challenges.


Learn about the most critical issues facing security and counter terror professionals by attending our flagship paid-for congress or take part in one of the many free-to-attend sessions taking place on the show floor.

At the flagship conference, Internationally recognised experts will gather to debate the threats we face, define operational strategies and to help shape future policy.

This closed-door conference brings together 100s of military and homeland security professionals to explore developments in national security and the capabilities needed to protect against them.

New for 2017, the free-to-attend Security Design Conference will explore how security can become more integrated at the design stage of major projects.

For professionals tasked with protecting businesses and the assets essential for the maintenance of everyday life.

The number and sophistication of threats to our cyber infrastructure are increasing daily and ss a result cyber infrastructure needs to be secure.

Public and private sector buyers, influencers and government delegations will attend to explore how the latest technology can be matched to their current and future needs.

This zone will showcase the latest products, strategies and thinking for law enforcement and special operations teams across the world.

Hear from experts on the most critical issues facing borders and transport hubs. Meet fellow practitioners to share best practice and explore the latest capabilities for secure border and transport management.

Co-located: Ambition Conference

Hear from experts on topics such as the future of emergency services, pandemic diseases, response to terrorist attacks and resilience for businesses.

Co-located: Forensic Workshops

The Seminar & Workshop Theatre at Forensics Europe Expo will see leading forensics experts share the latest updates, exclusive case studies, and cutting-edge product demonstrations.

Register to attend

Jay McGowan, US Representative & Secretary General CYBERPOL:CYBERPOL Not-For-Profit volunteer opportunities open in the United States


Jay McGowan

CYBERPOL is accepting appointments from private and public sector individuals and organizational representatives in the United States.

For individuals, we are interested in the following disciplines to include but not limited to:

– Graphic design/Web design

– Mobile application developers

– Programmers in Python / Pearl / PHP

– Cyber investigation

– Penetration Testers “manually without using tools”

– Voice and facial analysis

– Translating from Arabic to English and from English to Arabic

– Social Media Analytics for Cyber Security / OSINT

For organizations, we are interested in representatives looking to get involved in global cyber crime mitigation, cross-border global information sharing, and the overall reduction of cyber related criminal activity related to intrusion activity and cyber related counterterrorism in all related disciplines.

Feel free to reach out to: volunteer@cyberpol.info

Jay McGowan, US Representative & Secretary General CYBERPOL:Attribution – embrace it


Jay McGowan

Lots of talk the past few days on attribution related to cyber events, with much of it leaning to the negative and/or near impossible side. Fact is attribution can be validated quite definitively with a global Cradle-To-Grave investigative process, which requires access.

One of the challenges CYBERPOL observes is a large number of industry ‘fingerprinting’ may be limited in scope and/or scale which might lead to missed critical crumbs, to include but not limited to the many illicit VPN services located in global denied areas, as well as those sometimes located right in front of us, used to facilitate the types of activities we hear about in the media over and over again.

press@cyberpol.agency

Jay McGowan, US Representative & Secretary General CYBERPOL:CYBERPOL and Protecting Tomorrow- 2 Not-For-Profits team up taking action today


Jay McGowan

What better way to give back to make the world a little better, and the web safer for everyone.

CYBERPOL, The International Cyber Policing Organization, is an International Utility Not-For-Profit with headquarters currently located in the United Kingdom, announces a strategic partnership with Protecting Tomorrow, a United States Cyber Protection Organization, whose headquarters are established in San Diego, California.

In recent months, CYBERPOL received endorsements from major international players in the cyber security domain with involvement from both public and private sector organizations. In addition, CYBERPOL received support from law enforcement agencies active in the international cyber security landscape that have recognized the need for cross-border collaboration in support of the fight against global cyber crime.

The President of CYBERPOL, Mr. Ricardo Baretzky advised that the door is open for all countries to join CYBERPOL in this quest to make the internet a safer global environment for all.

The newly appointed Secretary General of CYBERPOL, Mr. Jay McGowan, informed media sources that CYBERPOL is on track to become a significant cyber crime information sharing capability, with requests to participate increasing as the CYBERPOL reputation and objectives become public.

The Chairman of Protecting Tomorrow, Mr. Rusty Sailors, stated that Protecting Tomorrow is strongly supportive of the expansion of CYBERPOL into the United States and welcomes the partnership. Through this partnership between Protecting Tomorrow and CYBERPOL, the team is on track to open the first international crime focused Security Operations Center (SOC) in the United States, in support of public and private sector activities. As a non-profit 501(c)(3), Protecting Tomorrow is in a unique position to coordinate across a broad spectrum of public and private organizations facing cyber crime challenges across the United States and abroad.

“The need for cross border collaboration in the fight against the ever-growing risk and level of sophistication deployed by online adversaries requires a coordinated effort; CYBERPOL provides a vehicle to make this happen,” said Mike Loginov CEO Ascot Barclay Group.

The first international CYBERPOL Cyber Security Summit occurred in Brussels, Belgium on 17 and 18 Nov 2015. The event received much attention with dozens of officials from the international community.  CYBERPOL continues to grow steadily with official representation across multiple countries; including the Unites States, United Kingdom, Denmark, Africa, Hungary, and Italy.

CYBERPOL has continuously demonstrated its effectiveness by sharing undisclosed critical vulnerabilities to appropriate partners and officials, and worked together to mitigate some of the most unique and complex cyber related threats the world faces today.

For further information please contact:

Protecting Tomorrow, United States Cyber Protection Organization

email: info@protectingtomorrow.org   http://www.protectingtomorrow.org

CYBERPOL, The International Cyber Policing Organization

email: press@cyberpol.agency    http://www.cyberpol.info

Jay McGowan, US Representative & Secretary General CYBERPOL:A non-proliferation cyber treaty proposed by the European Centre for Information Policy and Security


Jay McGowan

ECIPS announced yesterday that it would be making a proposal for an International Non Proliferation Cyber Treaty designated for signature later this year between several International Organizations whom already are on board.

This comes after the discovery of malware found last month that was uploaded to VirusTotal in the beginning of February that bears all the hallmarks of the Italian security software outfit supplied by the Hacking Team using covert computer cracking and surveillance tools sold to governments worldwide via its illegal stream of public sales to private corporations and governments outside the European Union. Law experts believe it is in contradiction to the European Espionage Act to manufacture any tools that could be used to spy on citizens within the EU and USA.

The malware wasn’t detectable by any of the major antivirus scanners till last week and it is believed that the Galileo Trojan can be detected by less than 10 out of 56 antivirus software packages and services if detectable at all. According to some University Scientists, it is possible that there are only two or three measures to detect the Malware infiltration.

It is now believed according to Counter Intelligence agencies that the Hacking Team software might have been used by the Turkish political wing to infiltrate the European Union’s federal network and it might already be too late according to cyber experts should this hypothesis be correct.

The question is why such a Non-proliferation Cyber Treaty was not proposed by the European Commission since the Wikileaks string of evidence was leaked last year causing crisis within the security industry when many private companies were exposed to having bought the Hacking Team Software.

The President of the ECIPS  said that there are few reasons for this. One of them being that at least two autonomous international organizations recognized under Art. 2 of the Convention 24 April 1986 European Convention, the Recognition of the Legal Personality of international organization in public interests by law has to agree to such treaty should at least one government fails to participate in such a non-proliferation cyber treaty as set out by the United Nations Security Council. Only then will the UN council be obliged to register such a treaty as it must fall within the legal framework of international treaties. Several officials said they would welcome such a treaty as it’s long outstanding given the threat of terrorist organizations who can use such tools by stealing the source code or legally buying it from developers.

President Baretzky further said that the manufacturing of these tools should be monitored by the European Government and should be for government use and application only for surveillance of cyber crime as necessary but CyberNuc tools should not be in the hands of political organizations or private firms. No control measures will bring unwanted results that could just add to the ‘0” day scenario.

SentinelOne security researcher Pedro Vilaça published a technical analysis of the malware earlier this week.  The dropper code was reviewed and compared with older samples and they can’t spot many differences, said Vilaça in his analysis of the malware. The malware developed by Hacking Team can be accurately dated as the code shows that it was last updated in October/November and the embedded encryption key is dated 16 October according to researcher Pedro Vilaça from SentinelOne security.

Mr. John Matherly, the programmer behind Shodan search engine, which collects data on open network ports, indicates that the malware’s host was first seen on 15 October 2015, and that the last information was gathered on 4 February. Mr Vilaça said in his comments to the issue of the update: “I just found some unique code in this dropper. This code checks for newer OS X versions and did not exist in the July 2015 leaked source code.

Counter Terrorist  agents who were interviewed by WNT news questioned also the possibility and raised the question if terrorist organizations such as ISIS, could be using the malware code maintaining and updating the Hacking Team’s code or is this is indeed a legit sample compiled by Hacking Team themselves?

It sends an alarming signal to governments that control manufacturing of Cyber Doomsday Tools could come at a huge price while some developers are seeking only the personal vested interest of their capital gains in the process.

Either way, the Hacking team has a lot to explain and it’s almost certain that a non-proliferation cyber treaty will be signed soon to prevent a cyber doomsday by cyber nuclear tools developed without legal control by European Governments. and the international community.

Experts strongly believe that Hacking Team is behind this new Mac OS malware because of the way it is coded. It is speculated that the issue has been brought to the attention of the Unite States this week and that an international investigation is imminent as such tools also poses a threat to the US and its allies.

Jay McGowan, US Representative & Secretary General CYBERPOL:CYBERPOL Issues CryptoLocker Alert


Jay McGowan

The International Cyber Policing Watchdog CYBERPOL issued a CryptoLocker alert yesterday to all internet users around the globe. This comes after many cases were reported within the USA and Europe in recent months where CryptoLocker was used as a ransomware to extort companies and private citizens of their cash.

CryptoLocker is a ransomware trojan horse software which targets computers running Microsoft Windows around the globe. It’s believed to have first been posted to the World Wide Web approx. 5 September 2013.

CryptoLocker spreads via infected email attachments sent to the user and can also run via an existing botnet. When activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware’s control servers. Thus in short there is no escape when any computer or server has been infected.

The trojan malware then displays a message which offers to decrypt the data if a payment through either bitcoin or a pre-paid cash voucher is made by a stated deadline, after which, should you not pay, are threatened to delete the private key. If the deadline is not met, the trojan  malware offered to decrypt via an online service provided by the malware’s operators, for a significantly higher price in bitcoin.

Hollywood Presbyterian Medical Center paid a $17,000 ransom in bitcoin to a hacker who seized control of the hospital’s computer systems and would give back access only when the money was paid. The assault on Hollywood Presbyterian occurred Feb. 5, when hackers using malware infected the institution’s computers, preventing hospital staff from being able to communicate from those devices, said Chief Executive Allen Stefanek.

CYBERPOL urges corporations, governments and the public that if you become infected and don’t have a backup copy of your files not to pay any ransom asked. That’s NEVER a good solution, as it turns the malware into a highly profitable business model and will contribute to the flourishing of this type of cyber attack.

CYBERPOL said it will publish a list of release notes of how to avoid falling prey to this cyber hacking scam. It said that all internet users should be particularly wary of emails from senders they don’t know, especially those with attached files and avoid opening them when you have received them.  We’d like to remind you of the importance of having a backup system in place for your critical files. This will help mitigate the damage caused not only by malware infections, but hardware problems or any other incidents as well.

CryptoLocker was isolated in late-May 2014 via Operation Tovar—which took down the ZeuS botnet that had been used to distribute the malware. During the operation, a security firm involved in the process obtained the database of private keys used by CryptoLocker, which was in turn used to build an online tool for recovering the keys and files without paying the ransom. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan.

CYBERPOL spokesperson said that European corporations in particularly Governments are at risk and warned that this is a tool that could be used by terrorist organizations and needs urgent attention and called upon all agencies to join forces in an international coalition effort in the fight against cyber crime without any delays.