Home News

PostHeaderIcon News

PostHeaderIcon Marine Piracy

A GROWING INTERNATIONAL THREAT

We now provide specialist consultancy and training to combat this growing international threat of marine piracy

 

PostHeaderIcon Clive Wood

AUTHOR, BROADCASTER & CONSULTANT
Clive Wood is a writer of short stories and novels. All his works are contemporary, and most are based on actual incidents or events.

His first novel "Acts of Deception" featuring the character of Keith Stuart received rare reviews and was critically acclaimed.

As well as working on the next novel in the Keith Stuart series, he is collaborating on an eight-part TV sitcom and working on high profile undercover investigative broadcasting projects.

In addition to his writing, Clive is a qualified Clinical and Medical Hypnotherapist, Psychotherapist, Counsellor and Kinesiologist, and has participated in numerous Radio Broadcasts on Hypnotherapy.

His qualifications are extensive:

• National Council of Psychotherapists
• British Association for Counselling
• United Kingdom Guild of Hypnotist Examiners
• National Council for Hypnotherapy
• Certified Master Hypnotist
• Association of Systematic Kinesiology

Clive also works with ex-Special Air Service (SAS) Soldiers and other Special Forces personnel who have emotional, mental and physical problems. He has developed training strategies for, and is consultant to, SF International - SF Security, providing courses Counter-Terrorist training and Risk Assessment to the Corporate sector.

Clive has long been recognised as a consultant to well known Sports Clubs and Personalities for injuries and ability enhancement.

 

PostHeaderIcon Telecommunications

TRUST IS A DANGEROUS MISAPPREHENSION...

In all areas of Business, communicating by landline and mobile phone has become a necessity in order to react fast to customers’ needs. Users exchange via public networks confidential and sensitive data about their business unaware of how this information is handled. Users believe that their information is kept confidential and protected against interception. This trust is a Dangerous Misapprehension!

If an adversary can gain access to the network provider's technical facilities (lines, switching exchanges, base stations), he will then be able to listen in to your conversations. This applies to connections both in the mobile communication network and in the landline network. Micro-wave links, on which transmission is normally effected unencrypted, can be intercepted with a moderate amount of technical effort. If the calls are connected over line-connected paths from the base station to the mobile switching centre ( MSC) , a physical attack on the cable paths is necessary.

If a base station is connected to the switching node over an unencrypted micro-wave link, as is normally the case, it is possible to intercept and tap these radio signals unnoticed using antennae and special receivers. The threat is all the greater if all phone calls for the connected base station are transmitted over these micro-wave links. Additionally Special technical systems exist which exploit the weakness of one-sided authentication in the GSM network. The only Authentication which takes place is the authentication of the mobile phone to the base station. The mobile does no authentication of base stations, which means eavesdroppers are able to pretend to mobile phones to be a base station and extract subscriber data from the GSM SIM as well as disable encryption during calls.