Below are a series of case studies to give an understanding of the quality and thoroughness of ISSL. Please note that some information has been omitted or altered in the interests of maintaining our client’s security
Security Risk Management
A British businessman was arrested in The Eastern Mediterranean because of being listed on an INTERPOL “Red Notice”.
His lawyers in UK, France and United States were unable to have the “Red Notice” overuled for the Lebanese to release him.
The Lawyers had examined the evidence behind the “Red Notice” application and believed that they were fraudulent. After six months with no positive movement in either the release of the businessman or the cancellation of the Red Notice, ISSL were approached to see if we could get the client back to the United Kingdom.
Using in country resources we were advised that the enforcement of the “Red Notice” was for reasons of extortion to encourage monies to be paid for his release. ISSL arranged for the businessman to be taken to a safe house and while there changed his appearance, arranged travel documents so that he could travel and repatriated back to the UK. Once there he presented himself to UK immigration and the UK authorities are happy to have him return to the UK.
Subsequently, we were asked to investigate the Red Notice with INTERPOL and as a result the Red Notice was removed.
Geo Political Projects
ISSL personnel have at different times been asked to support infra-structure & Geo political projects. The spread of ISSL relationships throughout the world have been used to identify future trends and political difficulties which has allowed us to design & implement programs that’s manage risk and reduce the exposure to future problems.
A recent example of this has been an oil & gas field security project in the Eastern Mediterranean. The political spread of the project impacts into two countries with a history of conflict and which has made the geographical area unstable. ISSL were requested to produce ideas and suggestions on how to manage the project to secure both the production fields and products once they been extracted.
The company has also been involved in advising the European partners of a joint venture project, from one of the central Asian countries of the former Soviet Union.
ISSL’s requirement was to ensure that the European partner’s investments were secure and properly managed and administrated.
Security Risk Management
A Head of State fell out with a trusted advisor after finding that over US $100,000,000 had been misappropriated. The advisor had relocated himself to a new country where he and other ex-nationals were running a campaign of misinformation against both the Ruler his government.
ISSL was asked to investigate and identify all senior people that were involved in the dissident organisations.
Through the use of covert overseas shell organisations, ISSL was able to make contact with the ex-advisor and visited him to plan potential new business. This resulted in being introduced to other people who were involved with the ex-advisor. ISSL were also given details of all the dissidents’ various banking arrangements. All of this we were able to pass back to our client.
A Client had noticed that confidential information that they were sharing under Client Attorney Privilege with their lawyers seemed to be immediately known to another firm with which they were in litigation. Since this was a very serious breach of confidentiality but their in house IT team were unable to identify the source of leakage so they requested support from ISSL.
ISSL recommended that to identify the area of the leakage a Full Network Penetration test be performed. This test identified both the network vulnerability that was being exploited and the potential workstations and mobile devices that had been compromised.
ISSL then recommended a second stage of research to identify the culprits of the intrusion in to the Client’s network. This was accomplished with the use of advanced offshore resources that ISSL have available. This led us to the culprits and enabled the Client to allow the client to successfully complete their litigation against the other side without any further legal issues or breaches in confidentiality. The Client is now considering a civil case against the perpetrators.
To further support the claims that the Client devices that had been compromised the organisational structure was forensically tested for support information in terms of access logs and traces of the incursion. This was in despite the fact that information had been deleted from these devices and even in once case the device had been destroyed in an accident.
Once the case had been resolved we provided additional support to the Client in order to further secure their corporate network against further violations and made further security recommendations that the Client has since initiated.