COUNTER-SURVEILLANCE SERVICES & COUNTER ESPIONAGE ADVICE

We provide a high standards of TSCM services, Cyber Espionage Response, Penetration Testing & Anti-Espionage advice services.
With maximum confidentiality our experienced team with the military/ government agencies background, and security cleared with BS7858:2012 standard, will provide you with peace of mind that is more than regular tactical surveillance counter measure services

OUR SERVICES

End to end solution that help to prevent espionage activity within hours in various locations: Offices, Boardrooms, Exhibition Facility, Open-Space Area, Hotel Rooms, Transportation and Residential Properties:
  • BUG SWEEPING 

    Inspection and detection for espionage activities in complicated areas: GPS and GSM devices,
    covert cameras, illicit eavesdropping devices, any type of Wi-Fi, Bluetooth or laser attacks.

  • CYBER TECHNICAL SURVEILLANCE COUNTERMEASURES 

    Inspection and detection of eavesdropping threats and vulnerabilities within Wi-Fi, Bluetooth & cellular networks. include spyware, malware and malicious payloads via software installed on the devices / networks.
  • PHYSICAL PENETRATION TESTING

    Penetrating the physical security systems and identifying vulnerabilities that could expose the organization to various threats. 
  • COVERT SURVEILLANCE
    Covert surveillance cameras, audio listener, 3D laser detectors, for a highly effective tool for investigation process.
  • ELECTROMAGNETIC & RF EGRESS

    inspection and detection of vulnerabilities around the various devices: Wi-Fi access points,
    PMR/site radios (security staff, facilities staff), Radio microphones (presentation, lecture
    theaters), Wireless presentation systems, Sensors of alarms system & control systems,
    Leakage from computer displays & projectors.
  • RF SHIELDED ROOMS

    Inspection services for rooms attenuation + implementation of shielded rooms equipments for
    preventing transmissions of data (in/out)
  • 24/7 COUNTERMEASURES

    Real time signal analysis & 24/7 protection equipment for your confidential meetings from attack from illicit eavesdropping devices.
  • INSIDER THREAT DEFENSE

    Predict and prevent threats before they became incidents rather than just document the damage, with AI & computer visioning we leverages machine learning identify events and highlight anomalies and potential risks in real-time.