Employee Fraud


Employee fraud cost UK businesses £40,000,000 last year.   Greater London was the worst affected area for employee fraud last year, with £7.1m in losses reported to the Metropolitan Police caused by 93 incidences of fraud. Meanwhile, the City of London Police received reports of £4.7m losses caused by 14 incidences…(Read More)

Verrimus has been offering quality assurance testing of TSCM teams for over a year now. The uncomfortable fact of the matter is that the vast majority of companies offering TSCM service are utter frauds. I’m aware that this is an extremely hard line to take and commit to writing, but I’m very passionate…(Read More)

TSCM – Bug Sweep  – This Video shows a Frequency Hopping Spread Spectrum (FHSS) signal, detected during a TSCM bug sweep of an corporate location in Europe. Verrimus operators quickly pinpointed the source of the transmission and located the device. Frequency Hopping Device – Click To View &nbsp…(Read More)

Mobile Phone Tracking


  There are numerous ways in which hostiles can track a persons (targets) location using the persons mobile phone. The mobile phone is a device almost guaranteed to be with the target 24 hours a day, which makes it the perfect exploit for tracking the targets location. The capability to track a targets mobile phone…(Read More)

Deep Plant Attacks


  Contrary to what the vast majority of ‘experts’ on the internet may say….the truth of professional technical surveillance attacks are not a ‘bug’ hidden somwhere in a room. These would be what we would class as ‘Quick Plant’ attacks.  Quick plant attacks are very rarely used by attackers as they’re very easy…(Read More)

So…I’m not usually one to moan (no really!) but there’s a perceived ‘impossible problem to solve’ that really, really gets to me, so I’m going to have a moan about it. As well as pointing out how simple the problem is actually to solve, and hopefully throw some light onto the…(Read More)

‘Advantage Through Knowledge’ has been our tagline since the inception of the company in its 1st generation incarnation. It’s more than just a tagline for us, it’s a core belief. Each one of our services and the sub-services that fall from them give our clients an advantage.  A strategic or operational advantage…(Read More)

Covert Surveillance, technical surveillance, electronic surveillance, on individuals or organisations, by targeting their mobile phones is a primary methodology used by intelligence agencies, law enforcement agencies and without doubt all high level hostile criminal & terrorist organisations to intercept mobile phone traffic and track location data of individuals. Organisations and individuals that operate in ‘hostile…(Read More)