Contact Support

If you are an existing client to get support call us on:

Team Cedar on 01483 963290
Team Maple on 01483 963292

If you have 24 hour support please use your dedicated 24 hour support number


Login to the portal

Support portal

If you've been given a 6-digit support code

click here

Not an existing customer?

Contact us

Hunted TV Show: A Cybersecurity Expert’s Insight

The premise of TV’s Hunted is for ten wannabe fugitives to outsmart and escape the grasp of an elite team of ex-military, law enforcement, and security force members. This team, the ‘hunters’, have all sorts of tricks up their sleeve that can reveal an astonishing array of information about the fugitives. They obtain this information using the latest technology, which sadly, cyber criminals have also been known access.

To illustrate just how real the threat of cybersecurity attacks can be, we take a closer look at how the hunters use technological resources when tracking fugitives. In so doing this, we also reveal how a cyber criminal can launch an attack. Find out more about your online privacy concerns with our insight into TV’s Hunted.

Tracking Fugitives with their Digital Footprint

Our increasingly online world is designed to make life easier, but with convenience comes a cost. Every time a person uses the internet they leave a breadcrumb. Whether it’s checking social media or Google-searching a location, this information is stored, which in effect means it could be accessed. A person’s digital footprint is the first place to start when tracking someone down or gathering information.

Location Services

Smart phones have location services (like Google Maps) on all the time by default, so unless a user actively switches these off, open-source tools – which are accessible to the public – can be used to locate a person’s whereabouts as they move. This means it’s hard but not impossible to find out their home address, work address, the places they’ve visited and even the path they took.

Basic burner phones are better but even these can be used to track someone once a pattern has emerged. This could be created in a range of ways, from regular phone calls or texting, to repeatedly buying top-up credit in specific shops.

Social Media

Facebook accounts are linked to mobile phone numbers, so as soon as you know someone’s phone number it’s usually possible to find their social media account. With this you can find their photograph, which is necessary when tracking fugitives using CCTV.

Another point to make about social media is that these accounts are all opened using an email address. After discovering a person’s email address, it can be possible to acquire their password. The truth is that passwords are increasingly easy to find out, especially due to poor cyber security and historic data breaches at Adobe, LinkedIn and MySpace. These breaches actually displayed account holders’ credentials including their email address and passwords. Even if these passwords are no longer correct, many people update them by changing just one digit, so they are remarkably easy to guess. Find out more about managing passwords.

Security Questions – Poor Cybersecurity

In the event that a hunter or cyber criminal hasn’t been able to find out someone’s passwords, it’s still possible to hack into their accounts by answering security questions.

It can actually be astonishingly easy to answer these questions thanks to online records. Online birth records can reveal your date of birth, parents’ names, old addresses and even your mother’s maiden name. But, it might not even be necessary to research this information, thanks to ever-popular social media quizzes. So many of these quizzes are designed to prompt people to answer these questions, such as ‘Find out your wrestler name’ – combining your first pet’s name and the street where you grew up.

Tracking Fugitives Using Patterns

Humans are creatures of habit. In addition to a digital footprint, the hunters on the program will also determine what the fugitives are doing by putting together a pattern using things like CCTV cameras and card payments.


The UK is full of CCTV, with London being one of the most camera-dense cities in the world. It’s possible to enter a photo of a fugitive’s face into software which will then pick it up when it appears on CCTV. Even if a fugitive uses a disguise, it’s reported that a walking gait is also unique to a person, so this too can be used for identifying and tracking fugitives. It might also be possible to find out when a fugitive has bought a disguise such as if they have used a card to pay for goods, or Google-searched a shop address first.

Card Payments

Today it’s so easy to pay for things using contactless payments, smart tech pay, and Oyster cards to travel in London. But all of these methods leave breadcrumbs.  Even the use of a store points card in a supermarket or coffee shop can give away someone’s location. Data is stored by the card provider, and can be accessed by the state with a warrant – or potentially hacked into by a criminal.

While single pieces of information might not always be that helpful, a collection will be. For example a hunter could identify your friends via social media, use CCTV to identify what bus you take on your commute, and card information that shows you buying a coffee every Friday at the same time in the same shop. It’s with all of this data combined that it becomes fairly easy to put together an idea of a person’s pattern, and therefore find them.

Online Privacy Concerns

The purpose of this insight into Hunted is to demonstrate how easy it can be to obtain personal information. Although the technological resources used in the show are designed for use by the police and security professionals, the sad truth is that there are professional hackers out there whose job it is to find ways to access and use this technology. You should assume that anything online is potentially ‘hackable’, so it’s important to put as many shields as possible in place to protect your data.

The best way to abate your online privacy concerns is to stay as informed as possible. From learning about how to spot a phishing email, to tips to improve your human firewall, stay protected by being prepared. Discover more about ramsac’s cybersecurity services and keep your information safe.

Receive our FREE bespoke IT health assessment

11:29 22 May 20
Changing IT support providers, like changing lawyers, is not a decision any business takes lightly or frequently. The decision is fraught with numerous questions such as whether the new team will understand my business needs, will it cause teething problems, and more importantly, will the reality match the sales pitch! We took that decision to move to Ramsac in January after ten years with another provider and we have not regretted that choice for a moment. Ramsac are simply great! From the get go we have been very well supported from the front line very helpful telephone support team right up to our relationship manager. We feel that the Ramsac team are very much an integral part of us . What however has driven us to write this review is the fabulous support we have received following a cyber attack this week. Something no business wants to happen but is increasingly a sad factor of modern cyber life. The Ramsac cyber support team were superb and really gave us first class support and guidance through what was frankly a horrible experience. Thank you Dan! Denise Herrington
The HR Services Partnership
The HR Services Partnership
17:59 16 Jan 20
We have worked with Ramsac since 2015. They offer a truly winning formula. We have been delighted by their support at all three levels: our network consultant (Colin) understands our set up and is great when we need to upgrade our infrastructure; we have ready access to our account manager who has been great with supporting our growth; and the helpdesk is always so patient for the day-to-day glitches. Very professional and supportive – thank you team ramsac!
Zoe Brooks
Zoe Brooks
13:02 16 Jan 20
Sam on the support desk is extremely knowledgeable and helpful. Every time I have rung with an issue and she has helped the problem has always been rectified smoothly and quickly!
Sarah-Jane Calloway
Sarah-Jane Calloway
16:02 06 Jan 20
Ed spent two days with us following an office reshuffle. He worked to a very high standard and was very helpful, courteous and happy to sort out anything we asked of him!
Luke Hoey
Luke Hoey
14:20 07 Nov 19
Always very helpful and will work hard to resolve any issues you have.
Richard Renson
Richard Renson
16:54 10 Dec 18
Great, helpful IT Kings and Queens
Andrew Worth
Andrew Worth
12:37 30 Aug 18
fine bunch
Colin Warner
Colin Warner
08:46 06 Dec 17
Excellent managed service provider.
Selom B
Selom B
11:58 10 Dec 16
First Class!! Responsive, knowledgeable, professional and very easy to work with - Ramsac have been a fantastic strategic IT partner for the last few years and I'm sure will continue to be for many years going forward. I would highly recommend them!
Ian Windle - Inspiring Leadership
Ian Windle - Inspiring Leadership
08:53 04 Jul 16
Great IT business, with a powerful management team. Could not recommend them more highly.
Patrick O'Luanaigh
Patrick O'Luanaigh
10:55 01 Jul 16
A truly fantastic IT support company - I can't speak highly enough about them.
Sarah Whitemore
Sarah Whitemore
11:59 20 Jun 16
I have known Dan May and Ramsac for 5 or 6 years now. Dan is such a great guy and really helpful with strategic advice and input on all things IT. He's so approachable and doesn't baffle you with IT jargon. If you are looking to outsource your IT or you have a problem you need help with Dan is definitely the one to ask.
Jonathan Richards
Jonathan Richards
12:14 31 May 16
I've worked with Ramsac for many years and whole heartedly recommend their services. They are always professional, approachable and have the rare skill of making IT understandable. Their can do attitude leaves you feeling that you are in safe hands.
See All Reviews
© 2022 ramsac. All rights reserved.