
We are here to help with any kind of incident response, counter espionage communication integrity
Our Team of Active Countermeasure and TSCM Service Professionals will be found at:
Follow us:




Expert opinion in Counter Surveillance
You can rely on our discrete technical surveillance countermeasures (TSCM) services to protect you from any kind of espionage




United Kingdom
Germany
Australia


Physical Perimeter Defense:
We conduct a physical security inspection. Our experts with many years of experience will conduct a thorough inspection of all rooms and their equipment (electronics, furniture and other items). This type of inspection is time-consuming but necessary. A series of analyses will be performed to uncover the eavesdropping. For example, RF spectrum measurements, triangulations, but also inspection with a thermographic camera.
Actions performed:
Physical inspection of all non-detachable items in the controlled rooms;
Thermographic inspection of all objects in the rooms to be inspected;
Inspection of suspect electrical outlets, switches and sensors;
Detection of hidden cameras with a reflectometer;
Inspection of ceiling tiles (if present in the rooms inspected);
Analysis of the radio spectrum in the range of 9 kHz to 22 GHz (allows identification of active radio interception operating in the range of these frequencies);
Triangulation of the radio background by a spectrum analyser in the range 9 kHz to 22 GHz;
Inspection of all electrical sockets, switches and sensors;
Physical inspection of all detachable objects in the rooms to be inspected (for this purpose, all parts of PCs, monitors, landlines, air conditioners, printers, etc. are inspected); it also allows the identification of network sniffers and damaged or no longer active eavesdroppers.
Airspace Cyber Defense:
Modern cyber threats are more common than traditional eavesdropping these days. But our certified cybersecurity experts can handle them. For example, they can detect sniffers(devices that intercept all network traffic) and possible network anomalies (e.g. an active IMSI Catcher).
Actions performed:
Control of Wi-Fi and Bluetooth networks (allows you to identify eavesdroppers and hidden cameras transmitting over any Wi-Fi and Bluetooth network in the vicinity of the monitored object);
Detection of IMSI Catcher active during searches (IMSI Catcher is used for operational interception of mobile phones);
Detection of Rogue Access Points (A Rogue Access Point is an illegitimate wireless device connected to the network that allows remote unauthorized access);
Evil Twin Access point detection (An Evil Twin is a copy of a legitimate access point that is designed to force users to connect to a fake network under the control of an attacker);
Auditing the physical security of the facility (audit whether it is possible to gain physical unauthorized access to controlled areas through lockpicking, RFID bypass, alarms, motion sensors, and more).
