SlideShare a Scribd company logo
1 of 8
Download to read offline
Technical Surveillance Counter Measures
Technical Sweeping
Services
We offer unrivalled experience in the field
of Technical Surveillance Counter Measures
(TSCM), or‘bug sweeping’as it is more
commonly known. The provision of TSCM
surveys and training is one of our core
activities and we pride ourselves on our
ability to view a task holistically in order to
identify potential weaknesses, as opposed
to focusing purely on the technical threat.
What sets us apart from the majority of other
providers is our UK Government operational
background and the insight and experience we
have gained over many years, which enables
us to identify the most likely methods and
techniques that an eavesdropper might use. For
this reason, we always commence our surveys
with a full threat assessment in order to identify
the level of sophistication and access most likely
to be available to hostile parties.
Reconnaissance
A discreet,“silent”reconnaissance
visit is recommended in advance of
the sweep so we can estimate the
duration and resources required.
Although the reconnaissance and
survey can be conducted at any
time, it is preferable to conduct
them in a discreet manner, with as
few people aware as possible and
suitable cover agreed in advance.
Survey
About 60% of the survey time is
devoted to conducting a thorough
physical search and identifying
possible vulnerabilities. The rest
is spent examining the radio
spectrum and using specialist
technical detection equipment
and techniques. We adhere to
strict operating procedures by
minimising speech and deploying
a source of pre-recorded ambient
sounds, suited to the location,
in order to trigger any sound-
activated devices into transmitting,
thereby enabling their detection.
Ultrax Consulting
Ultrax Consulting Limited offers sophisticated
security solutions to clients globally, whether
in the form of proactive intelligence gathering,
preventative security measures, consultancy
advice or training. The company’s‘hunter turned
gamekeeper’approach is a clear advantage
in executing a mission statement to deliver
a genuinely high quality service, based on
proven knowledge and experience of the most
sophisticated techniques and technologies.
The company’s services include, but are not
limited to:
» Technical Surveillance Counter
Measures (TSCM)
» Covert Surveillance
» Surveillance Detection
» Cyber Security
» Security Audits
» Bespoke Training
Technical
We use the latest electronic counter-measures
equipment to conduct an audit of the
radio spectrum aimed at detecting hostile
transmissions and also uses a device which can
detect electronic equipment, such as digital
recorders, even when they are switched off.
Mains, telephone and data cables are examined
for the egress of audio.
Physical
The physical search covers the areas most
commonly used to conceal eavesdropping
devices and includes inspection of ceiling
and floor voids, plus power, telephone and
data sockets. Computers and keyboards are
inspected for evidence of the use of‘key-
stroke logging’devices, which are increasingly
being used to capture typed information and
passwords from computers. An extremely
sensitive thermal-imaging camera is employed
to help locate the tell-tale thermal signatures
of concealed eavesdropping devices. Once
inspected, numbered tamper-evident seals
are fitted, if required, to act as a deterrent
to potential eavesdroppers and indicate if
the protected item has been interfered with
following the survey.
Audit
In addition to the electronic and physical
elements of the search, an inspection of the
overall premises is made, focussing on other
areas of potential weakness such as locks/access
control, supervision of cleaning/maintenance
staff, digital media/mobile phone policy and
control of keys to sensitive areas and document
cabinets.
Report
Upon completion of the survey, the findings
and any recommendations to further minimise
the likelihood of a successful technical
surveillance attack, are presented in a clearly
written, comprehensive report. Once a sweep
has been carried out and appropriate security
procedures are in place, it is recommended that
regular sweeps be conducted every six months,
or prior to specific, sensitive business events
which may attract unwanted attention.
Training
We offer a range of bespoke TSCM training
courses aimed at both novices and established
security personnel. They enable candidates to
understand the latest threats and technologies,
select the most appropriate equipment and
conduct methodical and effective physical
searches. Technical elements are reinforced by
hands-on sessions with the latest equipment.
Courses can be delivered either at our training
facility, offering the opportunity to conduct
physical searches of commercial and residential
environments, or at a location to suit you.
Equipment We Use
We hold a variety of the latest counter
surveillance equipment at our offices in
London and are able to deploy globally at
short notice. Our operational backgrounds
and experience enables us to travel to what
some might regard as challenging locations.
The enclosed list does not represent our entire
inventory and our equipment is continually
refined to keep apace with changing attack
techniques. The equipment that we use on a
day-to-day basis has been selected to provide a
balance between portability, performance and
survey location. Should our threat assessment
identify the likely use of a specific technology,
we are able to tailor the counter-measures
equipment we deploy accordingly. Our counter-
measures equipment inventory includes, but is
not limited to:
» Audiotel Scanlock M3
Advanced Counter-
Surveillance Receiver
Latest and most up to date
model in the long-running
Scanlock range. Used to detect
eavesdropping devices by rapidly
scanning through the radio
spectrum and locking onto local
transmissions. Results can be
viewed and stored in spectrum
and waterfall formats via attached
laptop computer. Automatically
identifies digital burst
transmissions, including GSM, 3G,
DECT and Wi-Fi.
» Audiotel Super-Broom Non-
Linear Junction Detector
(NLJD)
Emits a strong radio signal in order
to ‘illuminate’ nearby electronic
devices and acts like a radar to
detect them, even when they are
switched off. This device is often
used by prison authorities to locate
illicit mobile telephones.
» Audiotel Delta-V Advanced
Differential Receiver
Hand-held receiver which detects
local radio transmissions at
frequencies up to 15 GHz and
allows the user to quickly locate
their source.
» Audiotel TCM-03 Telephone
Tap Detector, plus Capacitive
Pick-up Amplifier
Allows the user to check for illicit
audio signals on telephone, data
and mains cables. Can be used
to detect audio on all forms of
cabling without the need to make
direct electrical connection.
» Aaronia Spectran HF-60100
Spectrum Analyser
Graphically indicates the
amplitude and frequency of radio
transmission in the area being
surveyed and, in the hands of a
TSCM technician with a developed
knowledge and understanding of
the radio spectrum and commonly
used eavesdropping frequencies,
allows him to identify and locate
suspicious transmissions amongst
the myriad electronic emissions
typically encountered in an urban
environment.
» Icom IC-R20 Communications
Receiver
Used in conjunction with Scanlock
M3 and spectrum analyser to
listen to and identify transmissions
which have been detected.
» Fluke Ti100 Thermal Imaging
Camera
A hand-held device which
generates a constantly updating
video image based upon infrared
(thermal) emissions to allow the
operator to identify sources of
heat. Assists in the rapid detection
of concealed electronic devices
in walls, ceilings and seemingly
benign objects.
» Camera Lens and Infra-Red
(IR) Detector
To assist in the detection of covert
cameras and illumination/egress
devices.
» Video Endoscope and Video
Pole Camera
To visually examine voids and
other locations where covert
eavesdropping equipment and
microphones might be concealed.
Areas typically examined include
stud walls, trunking and conduits,
furniture, ceiling voids and light-
fittings.
» Physical Search Tools
To allow removal of power sockets, data and
telephone points, keyboards, distribution
panels, mains blocks and other areas where
eavesdropping devices may be concealed. Once
checked, discreet tamper-evident seals may
be used to indicate if access has been gained
between sweeps.
In addition to the extensive array of
equipment we hold, we are passionate about
keeping up to date with the latest technology
and techniques, using this accrued knowledge
to better focus on the most likely means of
attack. We conduct various training courses for
commercial and government clients, and also
provide consultancy services aimed at ensuring
that a client can maintain and improve their
defences between scheduled surveys.
Intelligence | Security | Training
Ultrax Consulting Limited
29 Farm Street, London W1J 5RL
United Kingdom
+44 (0)20 7193 7460 | info@ultraxconsulting.com
www.ultraxconsulting.com

More Related Content

What's hot

Aviation Security and the Active Shooter
Aviation Security and the Active ShooterAviation Security and the Active Shooter
Aviation Security and the Active ShooterErin Planting
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Xerxes Oosthuizen
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourKasper de Waard
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Lancope, Inc.
 
Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Digital Bond
 
Bpg arc flash
Bpg arc flash Bpg arc flash
Bpg arc flash Deal Point
 
RC Presentation MSPCE 2016
RC Presentation MSPCE 2016RC Presentation MSPCE 2016
RC Presentation MSPCE 2016Rick Cox
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochureColin Valencia
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisP1Security
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationOpposing Force S.r.l.
 
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systemsDefcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systemsPriyanka Aash
 

What's hot (16)

The Bug Sweepers TSCM Guide
The Bug Sweepers TSCM GuideThe Bug Sweepers TSCM Guide
The Bug Sweepers TSCM Guide
 
Aviation Security and the Active Shooter
Aviation Security and the Active ShooterAviation Security and the Active Shooter
Aviation Security and the Active Shooter
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
 
2015 ERII-CCISM
2015 ERII-CCISM2015 ERII-CCISM
2015 ERII-CCISM
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Incubation of ICS Malware (English)
Incubation of ICS Malware (English)Incubation of ICS Malware (English)
Incubation of ICS Malware (English)
 
Bpg arc flash
Bpg arc flash Bpg arc flash
Bpg arc flash
 
RC Presentation MSPCE 2016
RC Presentation MSPCE 2016RC Presentation MSPCE 2016
RC Presentation MSPCE 2016
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Tab Smarti Presentation General
Tab Smarti Presentation GeneralTab Smarti Presentation General
Tab Smarti Presentation General
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochure
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
Extracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - PresentationExtracting the Painful (Blue)Tooth - Presentation
Extracting the Painful (Blue)Tooth - Presentation
 
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systemsDefcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
 
Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316
 

Similar to TSCM : Bug-Sweeping

Surveillance Services
Surveillance ServicesSurveillance Services
Surveillance ServicesPaul Andrews
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Dr. Idris Ahmed
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Hussain
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Zia Hussain
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013Firoze Zia Hussain
 
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...SecurityDetectionSol
 
Secure and safe monitor ur hazard plant with Link-vue System
Secure and safe monitor ur hazard  plant  with Link-vue SystemSecure and safe monitor ur hazard  plant  with Link-vue System
Secure and safe monitor ur hazard plant with Link-vue SystemMahesh Chandra Manav
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system운상 조
 
Complex safety cloud platform
Complex safety cloud  platformComplex safety cloud  platform
Complex safety cloud platformAnton Panfilov
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLSsuccessdsp
 

Similar to TSCM : Bug-Sweeping (20)

Surveillance Services
Surveillance ServicesSurveillance Services
Surveillance Services
 
Surveillance Services
Surveillance ServicesSurveillance Services
Surveillance Services
 
Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014Tecomex Forensics Brochure 2014
Tecomex Forensics Brochure 2014
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
403 10
403 10403 10
403 10
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
Walk Through Metal Detectors Your Ultimate Weapon in the Fight Against Unauth...
 
Intercept product
Intercept productIntercept product
Intercept product
 
Secure and safe monitor ur hazard plant with Link-vue System
Secure and safe monitor ur hazard  plant  with Link-vue SystemSecure and safe monitor ur hazard  plant  with Link-vue System
Secure and safe monitor ur hazard plant with Link-vue System
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
ASISwhitepaper[2]
ASISwhitepaper[2]ASISwhitepaper[2]
ASISwhitepaper[2]
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system
 
Perimeter security systems
Perimeter security systemsPerimeter security systems
Perimeter security systems
 
Complex safety cloud platform
Complex safety cloud  platformComplex safety cloud  platform
Complex safety cloud platform
 
An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
SECURITY CONTROLS
SECURITY CONTROLSSECURITY CONTROLS
SECURITY CONTROLS
 

TSCM : Bug-Sweeping

  • 2. Technical Sweeping Services We offer unrivalled experience in the field of Technical Surveillance Counter Measures (TSCM), or‘bug sweeping’as it is more commonly known. The provision of TSCM surveys and training is one of our core activities and we pride ourselves on our ability to view a task holistically in order to identify potential weaknesses, as opposed to focusing purely on the technical threat. What sets us apart from the majority of other providers is our UK Government operational background and the insight and experience we have gained over many years, which enables us to identify the most likely methods and techniques that an eavesdropper might use. For this reason, we always commence our surveys with a full threat assessment in order to identify the level of sophistication and access most likely to be available to hostile parties. Reconnaissance A discreet,“silent”reconnaissance visit is recommended in advance of the sweep so we can estimate the duration and resources required. Although the reconnaissance and survey can be conducted at any time, it is preferable to conduct them in a discreet manner, with as few people aware as possible and suitable cover agreed in advance. Survey About 60% of the survey time is devoted to conducting a thorough physical search and identifying possible vulnerabilities. The rest is spent examining the radio spectrum and using specialist technical detection equipment and techniques. We adhere to strict operating procedures by minimising speech and deploying a source of pre-recorded ambient sounds, suited to the location, in order to trigger any sound- activated devices into transmitting, thereby enabling their detection. Ultrax Consulting Ultrax Consulting Limited offers sophisticated security solutions to clients globally, whether in the form of proactive intelligence gathering, preventative security measures, consultancy advice or training. The company’s‘hunter turned gamekeeper’approach is a clear advantage in executing a mission statement to deliver a genuinely high quality service, based on proven knowledge and experience of the most sophisticated techniques and technologies. The company’s services include, but are not limited to: » Technical Surveillance Counter Measures (TSCM) » Covert Surveillance » Surveillance Detection » Cyber Security » Security Audits » Bespoke Training
  • 3. Technical We use the latest electronic counter-measures equipment to conduct an audit of the radio spectrum aimed at detecting hostile transmissions and also uses a device which can detect electronic equipment, such as digital recorders, even when they are switched off. Mains, telephone and data cables are examined for the egress of audio. Physical The physical search covers the areas most commonly used to conceal eavesdropping devices and includes inspection of ceiling and floor voids, plus power, telephone and data sockets. Computers and keyboards are inspected for evidence of the use of‘key- stroke logging’devices, which are increasingly being used to capture typed information and passwords from computers. An extremely sensitive thermal-imaging camera is employed to help locate the tell-tale thermal signatures of concealed eavesdropping devices. Once inspected, numbered tamper-evident seals are fitted, if required, to act as a deterrent to potential eavesdroppers and indicate if the protected item has been interfered with following the survey.
  • 4.
  • 5. Audit In addition to the electronic and physical elements of the search, an inspection of the overall premises is made, focussing on other areas of potential weakness such as locks/access control, supervision of cleaning/maintenance staff, digital media/mobile phone policy and control of keys to sensitive areas and document cabinets. Report Upon completion of the survey, the findings and any recommendations to further minimise the likelihood of a successful technical surveillance attack, are presented in a clearly written, comprehensive report. Once a sweep has been carried out and appropriate security procedures are in place, it is recommended that regular sweeps be conducted every six months, or prior to specific, sensitive business events which may attract unwanted attention. Training We offer a range of bespoke TSCM training courses aimed at both novices and established security personnel. They enable candidates to understand the latest threats and technologies, select the most appropriate equipment and conduct methodical and effective physical searches. Technical elements are reinforced by hands-on sessions with the latest equipment. Courses can be delivered either at our training facility, offering the opportunity to conduct physical searches of commercial and residential environments, or at a location to suit you.
  • 6. Equipment We Use We hold a variety of the latest counter surveillance equipment at our offices in London and are able to deploy globally at short notice. Our operational backgrounds and experience enables us to travel to what some might regard as challenging locations. The enclosed list does not represent our entire inventory and our equipment is continually refined to keep apace with changing attack techniques. The equipment that we use on a day-to-day basis has been selected to provide a balance between portability, performance and survey location. Should our threat assessment identify the likely use of a specific technology, we are able to tailor the counter-measures equipment we deploy accordingly. Our counter- measures equipment inventory includes, but is not limited to: » Audiotel Scanlock M3 Advanced Counter- Surveillance Receiver Latest and most up to date model in the long-running Scanlock range. Used to detect eavesdropping devices by rapidly scanning through the radio spectrum and locking onto local transmissions. Results can be viewed and stored in spectrum and waterfall formats via attached laptop computer. Automatically identifies digital burst transmissions, including GSM, 3G, DECT and Wi-Fi. » Audiotel Super-Broom Non- Linear Junction Detector (NLJD) Emits a strong radio signal in order to ‘illuminate’ nearby electronic devices and acts like a radar to detect them, even when they are switched off. This device is often used by prison authorities to locate illicit mobile telephones. » Audiotel Delta-V Advanced Differential Receiver Hand-held receiver which detects local radio transmissions at frequencies up to 15 GHz and allows the user to quickly locate their source. » Audiotel TCM-03 Telephone Tap Detector, plus Capacitive Pick-up Amplifier Allows the user to check for illicit audio signals on telephone, data and mains cables. Can be used to detect audio on all forms of cabling without the need to make direct electrical connection.
  • 7. » Aaronia Spectran HF-60100 Spectrum Analyser Graphically indicates the amplitude and frequency of radio transmission in the area being surveyed and, in the hands of a TSCM technician with a developed knowledge and understanding of the radio spectrum and commonly used eavesdropping frequencies, allows him to identify and locate suspicious transmissions amongst the myriad electronic emissions typically encountered in an urban environment. » Icom IC-R20 Communications Receiver Used in conjunction with Scanlock M3 and spectrum analyser to listen to and identify transmissions which have been detected. » Fluke Ti100 Thermal Imaging Camera A hand-held device which generates a constantly updating video image based upon infrared (thermal) emissions to allow the operator to identify sources of heat. Assists in the rapid detection of concealed electronic devices in walls, ceilings and seemingly benign objects. » Camera Lens and Infra-Red (IR) Detector To assist in the detection of covert cameras and illumination/egress devices. » Video Endoscope and Video Pole Camera To visually examine voids and other locations where covert eavesdropping equipment and microphones might be concealed. Areas typically examined include stud walls, trunking and conduits, furniture, ceiling voids and light- fittings. » Physical Search Tools To allow removal of power sockets, data and telephone points, keyboards, distribution panels, mains blocks and other areas where eavesdropping devices may be concealed. Once checked, discreet tamper-evident seals may be used to indicate if access has been gained between sweeps. In addition to the extensive array of equipment we hold, we are passionate about keeping up to date with the latest technology and techniques, using this accrued knowledge to better focus on the most likely means of attack. We conduct various training courses for commercial and government clients, and also provide consultancy services aimed at ensuring that a client can maintain and improve their defences between scheduled surveys.
  • 8. Intelligence | Security | Training Ultrax Consulting Limited 29 Farm Street, London W1J 5RL United Kingdom +44 (0)20 7193 7460 | info@ultraxconsulting.com www.ultraxconsulting.com