• Bug Sweeps

  • Electronic Surveillance

    Electronic surveillance is the monitoring of a home, business, or individual using a variety of devices such as CCTV, legal or illegal wiretapping, cameras, digital video equipment, and other electronic, digital, and audio-visual means. This happens more than you would think, we see this in Domestic Cases and in Industrial investigations. Lets face it, in today's interconnected world its easier than ever to be watched and stolen from. Let us help you mitigate your possibility of loss, call us today to discuss your needs.

    Hidden Camera Detection

    Now that tech is smaller and cheaper than ever, it's become easy to install cameras almost anywhere. In fact, once you start looking, you may realize that cameras are everywhere: on traffic signals, in parking lots and inside stores. If you're reading this article on your phone while waiting for your morning coffee, there's probably a camera keeping an eye on you right now. You may even have some "hidden" cameras of your own, like Dropcams for home security, nanny cams to watch the baby or a video doorbell to see who's knocking.

    One of the problems is that these tiny, inconspicuous cameras can be easily bought online. Browsing Amazon for hidden cameras is a little disconcerting. Cameras are disguised as alarm clocks, power adapters, smoke detectors, photo frames and even water bottles, most of them wireless and battery powered. These cameras are easy to obtain, and most require no technical skills to install, meaning anyone with ill intent could place them in a public place and watch you when you're unaware.

    Use our experts to determine and secure your privacy and proprietary information from prying eyes and ears. Call us today.

    Tapped Phones

    Have you ever been in the middle of a phone call with someone and heard a strange sound, like a click or a static noise, and wondered if your phone was being tapped? If so, you're not alone. Many people are concerned that their personal and business communications might not actually be private. Smartphones can be especially vulnerable to tapping, particularly if you've decided to jailbreak or root your device.

    If you hear pulsating static, high-pitched humming, or other strange background noise when talking on the phone, that may be a sign that your phone is being tapped. 

    • Strange noises do crop up from time to time on cell and landline calls, however, so this is not a surefire indicator that something is wrong. You'll want to check for other signs of unusual activity on your phone as well.
    • Your phone should be quiet when it is not in use. If you hear unusual sounds like beeping, clicking, or static even when you are not in the midst of a phone call, your phone may be tapped.
    • You can check for inaudible sounds on your phone by using a sound-bandwidth sensor on a low frequency. If it finds sounds several times in one minute, your phone may be tapped.
    • If you have a landline phone: If your phone emits a dial tone when it is on the hook, this may also be a sign that it has been compromised.
    • If your phone’s battery life suddenly is a lot shorter than it used to be and you have to recharge your phone far more often than you used to, then it’s possible there might be tapping software running silently in the background, consuming battery power. 

      • Consider how often you've been using your phone. Have you been making more voice calls or using apps more often than usual? If so, then that may be the reason you need to charge your phone more frequently.
      • Whether you have an iPhone or an Android phone, there are a few ways to get detailed information on what's hogging the battery and why it's running out so quickly. You may want to try using one of them to get a clearer picture of what's going on.
        • If you're using an iPhone, you can quickly find out which apps are consuming the most battery life by tapping Settings and then Battery, then scrolling down to the Battery Usage section. There are other apps such as Battery Life and Coconut Battery that can give you detailed information on what's consuming your battery life and how to extend your battery life.
        • If you're using an Android device, you can determine which apps are consuming the most battery life by opening the Settings app from your app drawer, expanding the Device section, and then tapping on the Battery option. There are other apps you can use to get granular information on what's eating up your battery life and how to manage it better, such as Battery Saver 2018 or Power Battery.
      • If your phone's battery is over a year old, it may be less capable of holding a charge. In that case, there are steps you can take to improve your cell phone battery life.
      • Your phone's battery warms up when it's being used. If your phone is hotter than usual, particularly if you haven't been using it, that may be a sign that something's amiss.

      Let us help protect your sensitive information from prying eyes and ears, call us today to discuss your needs.

     

    Ethical Hacking

    The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. ... Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.

    Let our experts determine the security of your network, call us today.

    Computer Forensics

    There are few areas of crime or dispute where computer forensics cannot be applied. Law enforcement agencies were among the earliest and heaviest users of computer forensics – as a result they’ve often been at the forefront of developments in the field.

    ​Computers can be considered a ‘scene of a crime’ – for example with hacking or denial of service attacks. They may hold evidence of crimes that happened elsewhere, in the form of emails, internet history, documents or other files relevant to crimes such as murder, kidnap, fraud or drug trafficking.

    A forensic computer exam can reveal more than expected

    Investigators are not only interested in the content of emails, documents and other files, but also in the metadata associated with those files. Records of a user's actions may also be stored in log files and other applications on a computer, such as internet browsers.

     So a computer forensic examination might reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.

    ​Commercial organizations have used computer forensics to help with all kinds of cases, including:

    • Intellectual Property theft

    • Employment disputes

    • Invoice fraud, often enabled by phishing emails

    • Forgeries

    • Inappropriate email and internet use in the workplace

    • Regulatory compliance

    ​Let our experts help you see whats really going on.