Are You being Tracked?

Technical Surveillance Countermeasures (TSCM).

Is your team been monitored or do you suspect covert surveillance equipment is installed. If someone or an agency considers you or your team a target or your movements it is important enough to target your position, you need to have your offices and vehicle checked for hidden devices.

Modern surveillance equipment can be placed in an office or car without the need to enter the vehicle or have the keys, foreign spy agencies and bad actors have found various ways to accomplish this.

In today’s business society surveillance equipment is not uncommon, there are lots of examples of advanced surveillance equipment installed into offices or vehicles for monitoring use, most were not detected by government sweeping tools.

Foreign governments, competing corporations, and private information gatherers frequently resort to the use of electronic surveillance devices to gain a competitive advantage in the market place. Others may use it to obtain compromising information that can be employed for a variety of uses ranging from simple embarrassment to blackmail.

Even the most vigilant security measures cannot rule out all incidents of illegal activity, clandestine or covert efforts, and devices that can compromise sensitive information, privacy, and confidentiality.

Our Digital TCSM team can conduct sweeping your vehicle from 5Mhz to 9ghz using the latest technology. We will find anything even if it sleeps or operates on specific times.

We only provide this service to corporate agencies.

Our Technology

Our sensor based TSCM module allows for monitoring in more locations with networking capabilities purpose built for remote and in-place spectrum monitoring. We can detect in real time new devices and prevent in real time listening equipment and active surveillance. and A standard GigE interface and streaming rates of 360 Mbit/s, combined with a compact form factor for increased portability, make the ThinkRF R5500 analyzer ideal for dispersed and continuous monitoring applications in any location.

The TSCM tool set we deploy features a sweep rate of 28 GHz/s at 10 kHz RBW and 40 MHz IBW and advanced triggering capabilities, we can capture short duration or faint signals of interest with a higher probability. By conduct deeper analysis with patented software-defined spectrum analysis technology which enables wide bandwidths, deep dynamic range, and 9 kHz – 27 GHz frequency range.

WiFi Networks, Find Flaws, Detect Rogue Devices and Secure Networks.

Digitpol Cyber Crime Team specialise in wireless network analysis, we offer RF site surveying, WiFi analysis, Secured wireless network installation and Wi-Fi security services for private and public Wi-Fi hotspot networks.

We perform Surveys to record all Wi-Fi networks on the 2.4GHz and 5GHz spectrum to determine what devices are on your network and if any rogue devices are present. We conduct pen testing on your network via Wi-Fi. We don’t need to access your offices to perform the tests.

Should I Be Concerned who’s on my WiFi?

Are you concerned about information loss or business secrets being targeted over WiFI? A small amount of information could be worth millions to the right people or could damage important negotiations. Loss of confidential information such as executive schedules could even put lives in danger. Traditional physical security and cyber security are important, but there are many gaps they leave unprotected. To ensure all is in order, a WiFi security sweep with a detailed report would provide an insight to any, technical surveillance issues.

Dedicated to TSCM, Technical Surveillance Countermeasures.

Providing RF and signal analysis is a key part of our daily business. We maintain the highest standards in both technology and training which is necessary to combat today’s threats. We deploy a mobile forensic unit that is equipped with all RF detection and analysis tools.

Extensive Experience.

Our technicians have extensive experience in multiple areas of RF security and wireless technology. We are certified in Forensic analysis of Wireless Networks.

Technology Partner

Digitpol works together with Keysight Technology for TSCM analysis and tooling. Keysight Technologies is a leading technology company that helps its engineering, enterprise and service provider customers optimize networks and bring electronic products to market faster and at a lower cost. Keysight’s solutions go where the electronic signal goes, from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $2.9B in fiscal year 2016. In April 2017, Keysight acquired Ixia, a leader in network test, visibility, and security. More information is available at www.keysight.com.

Our Expertise

TSCM

Digitpol has been providing technical surveillance countermeasures security sweeps and eavesdropping detection services since 2013. We are based in The Netherlands but travel throughout the EU and the world for our clients. Our goal is to provide the highest standard of RF testing, TSCM, WiFi analysis and security services, information security and technical services for executive and corporate security. We are ready to respond immediately to your needs.

VEHICLE SWEEPING

If someone or some company considers it is important enough to bug your home or your place of work, it is almost certain that they have considered monitoring your transport. If you drive anywhere or you are driven, it may be useful for someone to know your conversations whilst in your car. Bugs can be placed in a car without the need to enter the vehicle or have the keys; there are various ways to accomplish this.

LOCALIZATION OF DEVICES

Bugs placed in an office, lift, PC, clock, wall, lighting or under a vehicle.

With a sweep rate of 28 GHz/s at 10 kHz RBW and 40 MHz IBW and advanced triggering capabilities, we can capture short duration or faint signals of interest with a higher probability, using our network based sensors we can located instantly nre devices and detect digital bugging. Listening devices places in vehicles are more complex, a car is mobile and therefore can only be successfully bugged using a GSM bugging device that has no distance restrictions and the suspects would have global position (GPS) to monitor the car's position. 

Most bugs fitted to vehicles are either fitted covertly inside or even under the vehicle itself. Modern cars are hard to gain access to without disturbing an alarm, so specialist vehicle bugs that often include a GPS covert tracker system are fitted underneath, or in the engine area where access can be gained comparatively easily. These bugs are small and unobtrusive with a short wire that can be fed through a drain hole or existing grommet that has a miniature microphone at the end.

The result being that a bug can be fitted to your vehicle in a matter of minutes that can record conversations inside the car, track the vehicles movements to within a few metres and yet entry to the car has not been necessary.