Chinese Spy Device Found Hidden In British Government Car

Concerns over the covert use of Chinese spyware prompted intelligence operatives to investigate an unknown number of British government and diplomatic vehicles. This resulted in the discovery of at least one SIM card capable of transmitting location data and this tracking device was found hidden in an official government car.

Officials forensically searched the vehicles amid growing security fears and found disturbing items during the sweep, including a SIM card capable of transmitting location data which was found inside the sealed part of a car imported from China.

Security sours said the tracking SIM can watch the government over a period of months and years, constantly recording movements and building a picture of activities. 

The vehicles searched are often used by diplomats and senior members of the government and the suspicion is that Chinese intelligence services have been targeting British government ministers. It is understood Chinese car parts are fitted to government vehicles without being opened or examined because of warranty concerns.

Former British Conservative Party leader Sir Iain Duncan Smith has called for China to be recognised as a threat to the UK.

The discovery has raised national security concerns in the UK amid mounting fears that Chinese and Russian intelligence services had been targeting British ministers. The UK government now says China poses a significant threat to the UK on many different levels, citing potential hazards such as intellectual property theft and the intimidation of British citizens.

The announcement of this discovery followed Prime Minister Rishi Sunak's recent announcement that the 'golden era' of UK-China relations was 'over'. Sunak stressed that China posed a 'systemic challenge' to Britain's interests and values. 

iNews:   WIONews:     ANI:    The Sun:    Metro:      EEVBlog:     Express:   PPrune:     Ground:

You Might Also Read: 

Pegasus Spyware Used To Target British Prime Minister:  

_________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Five Data Security Trends Organisations Must Deal With
Zero Trust In (remote) Access »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Rublon

Rublon

Rublon protects endpoints, networks and applications by providing trusted access via two-factor authentication (2FA).

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.