CSS Cascade Menu by Css3Menu.com

CSS Cascade Menu by Css3Menu.com


Industrial espionage is highly prevalent in today’s business landscape. The secrets of any company are vulnerable to theft from competitors as well as foreign intelligence services. Spying of this kind can occur in many ways: mobile and office phones can be tapped, offices can be bugged, and even vehicles are often found to be targets. Another common avenue used in industrial espionage, often overlooked, is the use of malware in the targeting of work computers and networks.

Our law enforcement experience has made us familiar with all forms of espionage and social engineering attacks. We have used advanced intelligence-gathering devices in our law enforcement careers and continue to utilize our skills for the purpose of counter-intelligence. We can respond to suspicions of physical eavesdropping devices as well as their digital counterparts.
Our team can sweep networks, computers, and mobile devices for malware of any level, including government- and commercial-grade. Our technical knowhow and state-of-the-art equipment can detect all forms of eavesdropping devices regardless of their level of sophistication.

Technical Surveillance Counter Measures (TSCM)

Technical Surveillance Counter Measures (TSCM) involve an inspection of a location for surreptitious eavesdropping devices. Everything from phone lines, cell phones, and computer networks, to residential houses and hotel rooms, can be infected with “bugs” which can easily be used for eavesdropping and other forms of electronic surveillance. There are many reasons why individuals, corporations, and governments would utilize these tools to spy on each other: they could range from stealing intellectual property, to gaining advantage in matrimonial litigation, to stalking. Common bugs include cellphone bugs, wiretaps, digital recorders, spy gadgets, GPS trackers, etc.

The Cyber Diligence lab is fully equipped with the latest in TSCM equipment to detect any level of eavesdropping attack, no matter how sophisticated the adversary may be. Based upon the initial threat assessment, we can deploy the appropriate level of technology and personnel to efficiently and effectively search a location. We own all the equipment we use and are not dependent on rentals. Typically, we will deploy anywhere from two to six technicians per engagement -- technicians who are experienced and thoroughly trained on all aspects of TSCM operations. Since all members of our senior staff have prior law enforcement experience in highly sensitive units where they were involved in the placement of such "bugs" as part of their daily duties, we have a practical understanding of how and where to install such devices. Our experts can do a site survey of a location and view it from the installer’s perspective to determine the most likely places to install a device. This experience, along with state-of-the-art equipment and very strong ethics, makes us unique. If we accept the assignment, we will engage with the attitude, "there is a bug in this location and I am going to find it." We are able to conduct sweeps for bugs within your residence, business, or vehicle, operating either covertly or overtly depending on the circumstances.

*** We reserve the right to decline TSCM assignments if we suspect the requester may be under law enforcement surveillance.

Computer, Network, and Mobile Device Sweeps

As we depend more and more on digital communications such as email and text messaging for the exchange of ideas, the landscape of Signals Intelligence (SigInt) is changing rapidly. Now, instead of going through the trouble of gaining physical access to the target premises to install audio bugs, threat actors prefer to install monitoring software on computers and mobile devices to intercept email and text communications, as well as listen to room conversations when needed. When a simple commercial spyware program is installed on a mobile phone, it allows the attacker to intercept all data and voice communications of the device, in addition to turning the device into an audio bug for eavesdropping on room conversations. Simple, commercial-grade spyware installed on a computer will effectively serve the same purpose. Furthermore, an attacker can install such software from across the ocean.

Unfortunately, detection of such threats takes quite a bit of technical knowhow and technology.   Cyber Diligence can perform a “sweep” of a network, computer, or a mobile phone where we can detect unauthorized intrusions and identify malware. We are equipped with a multitude of tools that will allow us to conduct such sweeps stealthily and effectively. This can be a very comprehensive sweep of the client’s network and individual components for surreptitious monitoring software and hardware, or, a simple sweep of a mobile phone. The sweep is conducted utilizing state-of-the-art detection equipment, forensic software and hardware, and methodologies that are built upon a solid foundation of cybercrime investigative experience.

With the use of certain spy software, a mobile device may transform from an indispensable tool to a weapon, actively working against the owner. A compromised cell phone can be tracked, used to eavesdrop on phone calls as well as physical surroundings, and enable a perpetrator to view all text messages, chats, emails, pictures, videos, and social media activities, among other data. Similarly, a commercial-grade malware installed on a desktop or a laptop computer will allow the attacker to monitor all of the user's activities ranging from emails and chats to personal documents. In addition, spyware are often able to activate the computer's camera and microphone to record surroundings of the computer surreptitiously. Our tools make it possible to uncover these supposedly “hidden” programs, while our investigators make it more than likely that nothing will be missed in our comprehensive analysis.