First and most important, we must understand your concerns and objectives. Are you looking for a one time sweep of an office or a program to leverage our services to provide a comprehensive privacy protection program.
Second, who is the "bad guy"? Specifically, who do you suspect is targeting you and what is the value of the information they are try to compromise? This will provide a basis for calculating the threat level.
Once these questions are answered we can offer penetration testing to determine how difficult it would be for an outside entity to gain access to your infrastructure.
When the vulnerabilities are identified, an analysis of the environment is conducted to identify covert electronic devices which could jeopardize your information security. This could include, room audio, telephonic intercepts, visual compromise and tracking threats.
It should be noted that the three most exploited platforms are cellular, Wi-Fi and Bluetooth.
Yet a large number of service provides lack the ability to:
1. Ping a hidden cell phone to make it reveal its presence..
2. Analyze the Wi-Fi stream to identify ongoing audio or video content.
3. Analyze the ever growing Bluetooth transmissions to identify threats.
WE CAN !
Here is a partial list of a high threat examination process:
Radio Frequency Spectrum Analysis from 100 KHz to 24 GHz
Near Field Analysis of RF / Visual and Audio Threats
Examination of electrical conducts for Carrier Current
Thermal Inspection of Environment for covert devices
Excitation of Hidden Cellular Devices
Laser Refraction to Identify Covert Cameras
Digital EMF Scan to identify hard wired audio paths
Advanced Telephone Instrument Analysis
Audio Leakage Detection
Non-Linear Junction Scans with X-Ray Verification
Advanced Wi-Fi and Bluetooth Scans
Upon completion of the sweep a verbal report is provided.
A comprehensive written report is provided within 48 hours.