Counter Espionage Services
“The very nature of business competitiveness means that people will want to know your secrets, what your new product is, who your clients are and what you charge them.”

Counter Espionage

International Intelligence Limited was conceived with the precise purpose of providing Counterintelligence and Counter Espionage Services to corporate and government clients. Things were rather different in 2002 when we were incorporated; threats to businesses were different and technology did not play such a large part in everyday life. As threats have changed our approach has adapted, always with one eye on the future and one foot in the past.

Understanding the evolving Espionage threat
Our team of former intelligence officers and counterintelligence technical experts have a proven track record of carrying out full counter espionage tasks worldwide, protecting our clients' interests.

Countering espionage is very much about Attack Methodologies vs Control Measures, via Security Risk Assessments, that encompasses risk analysis, gap analysis/need analysis, looking at what technical, physical processes and policies are in place and what might be missing or improved upon. This is a constant cycle; as technology evolves so does our approach.

What are the top Espionage concerns?

  • Insider Threats (Unauthorized Disclosure)
  • Phishing
  • Man-in-the-middle Wifi attack
  • Hacking and DoS attacks
  • Caller ID Spoofing
  • Wearable technology
  • Unsecure office waste disposal
  • Eavesdropping

Technical espionage is amongst the most common modus operandi and can be the most cost-effective. A £50 telephone tap/wiretap, bugging or eavesdropping device can cause the loss of a great deal of confidential information, damaging a company's profit margin and/or reputation. The same can be said for Man-in-the-middle Wifi attacks, they can be conducted with little technical expertise with great effect. Waste disposal remains a major concern, especially with home-based Senior Management.

Another major dynamic is the traveling Company Executive because no matter how great your technical security or policies, travelling staff are exposed to a whole different set of threats, and "who doesn't love free Wifi!" being of course the greatest concern.

Another major dynamic is the traveling Company Executive because no matter how great your technical security or policies, travelling staff are exposed to a whole different set of threats, and "who doesn't love free Wifi!" being of course the greatest concern.

Espionage and security threats to businesses are not restricted to being technical: refuse disposal, waste management and key personnel are all areas that can be and are targeted.

Psychology is often used to gain information from key personnel. Having management and key personnel understanding the value of the information that they use and communicate daily is very important and should never be overlooked. The key indicators used are: MICE - Money, Ideology, Coercion & Ego

Internal Security Policies

A successful security policy does not need to be expensive nor difficult to implement; often the simpler the policy the better and more effective it is.

International Intelligence Limited can help your company or organisation develop a full and comprehensive internal security policy that is both practical and cost-effective. Prior to any internal security policy being developed, we would carry out a full security review and assess your present security levels, management and understanding.

Our Counter Espionage services cover:

  • Encryption of communications
  • Secure data storage
  • Technical Surveillance Countermeasures (TSCM) inspections and sweeps
  • Internal and external security review
  • Staff training and lectures

International Recognition

International Intelligence's CEO, Mr Alex Bomberg, is recognised as being a “subject matter expert” on espionage and counterintelligence-related issues, and has acted as a commentator on the subject for international TV News & Press, as well as delivering lectures to the likes of Facebook and the Graduate Institute in Geneva. See our Group "Media Library" for further details.


Information Security Management Systems

ISO 27001 and Information Security Management Systems

International Intelligence Counter Espionage services can run alongside any company or organisations' ISO 27001 policy and Information Security Management Systems. Our approach is over and above this international standard, addressing issues in more detail often with a holistic approach.

Implementation of the ISO 27001 standards is very important for a company or organisation to demonstrate that it is operating a secure IT infrastructure, and furthermore that it takes measures to combat the theft of sensitive data.

If you feel that you do not have the correct policies and procedures in place to safeguard against internal and external threats, we would be happy to assist you in producing practical and workable policies after an audit of all procedures.

Security Auditing and Penetration Testing

Security Auditing and Penetration Testing

It is vitally important to have external Security Audits conducted including technical and physical Penetration Testing.

Both Security Auditing and Penetration Testing will give a clear picture of where your organisation and its people may be exposed. This service is a 'root and branches' service that also includes examination of your security policies to ensure that they are fit for purpose and up-to-date with current legislation.

Our objective since 2002 has been to get espionage threats on the security agenda.

"Every good security policy starts with a difficult conversation" - Alex Bomberg, CEO