2. Technical Sweeping
Services
We offer unrivalled experience in the field
of Technical Surveillance Counter Measures
(TSCM), or‘bug sweeping’as it is more
commonly known. The provision of TSCM
surveys and training is one of our core
activities and we pride ourselves on our
ability to view a task holistically in order to
identify potential weaknesses, as opposed
to focusing purely on the technical threat.
What sets us apart from the majority of other
providers is our UK Government operational
background and the insight and experience we
have gained over many years, which enables
us to identify the most likely methods and
techniques that an eavesdropper might use. For
this reason, we always commence our surveys
with a full threat assessment in order to identify
the level of sophistication and access most likely
to be available to hostile parties.
Reconnaissance
A discreet,“silent”reconnaissance
visit is recommended in advance of
the sweep so we can estimate the
duration and resources required.
Although the reconnaissance and
survey can be conducted at any
time, it is preferable to conduct
them in a discreet manner, with as
few people aware as possible and
suitable cover agreed in advance.
Survey
About 60% of the survey time is
devoted to conducting a thorough
physical search and identifying
possible vulnerabilities. The rest
is spent examining the radio
spectrum and using specialist
technical detection equipment
and techniques. We adhere to
strict operating procedures by
minimising speech and deploying
a source of pre-recorded ambient
sounds, suited to the location,
in order to trigger any sound-
activated devices into transmitting,
thereby enabling their detection.
Ultrax Consulting
Ultrax Consulting Limited offers sophisticated
security solutions to clients globally, whether
in the form of proactive intelligence gathering,
preventative security measures, consultancy
advice or training. The company’s‘hunter turned
gamekeeper’approach is a clear advantage
in executing a mission statement to deliver
a genuinely high quality service, based on
proven knowledge and experience of the most
sophisticated techniques and technologies.
The company’s services include, but are not
limited to:
» Technical Surveillance Counter
Measures (TSCM)
» Covert Surveillance
» Surveillance Detection
» Cyber Security
» Security Audits
» Bespoke Training
3. Technical
We use the latest electronic counter-measures
equipment to conduct an audit of the
radio spectrum aimed at detecting hostile
transmissions and also uses a device which can
detect electronic equipment, such as digital
recorders, even when they are switched off.
Mains, telephone and data cables are examined
for the egress of audio.
Physical
The physical search covers the areas most
commonly used to conceal eavesdropping
devices and includes inspection of ceiling
and floor voids, plus power, telephone and
data sockets. Computers and keyboards are
inspected for evidence of the use of‘key-
stroke logging’devices, which are increasingly
being used to capture typed information and
passwords from computers. An extremely
sensitive thermal-imaging camera is employed
to help locate the tell-tale thermal signatures
of concealed eavesdropping devices. Once
inspected, numbered tamper-evident seals
are fitted, if required, to act as a deterrent
to potential eavesdroppers and indicate if
the protected item has been interfered with
following the survey.
4.
5. Audit
In addition to the electronic and physical
elements of the search, an inspection of the
overall premises is made, focussing on other
areas of potential weakness such as locks/access
control, supervision of cleaning/maintenance
staff, digital media/mobile phone policy and
control of keys to sensitive areas and document
cabinets.
Report
Upon completion of the survey, the findings
and any recommendations to further minimise
the likelihood of a successful technical
surveillance attack, are presented in a clearly
written, comprehensive report. Once a sweep
has been carried out and appropriate security
procedures are in place, it is recommended that
regular sweeps be conducted every six months,
or prior to specific, sensitive business events
which may attract unwanted attention.
Training
We offer a range of bespoke TSCM training
courses aimed at both novices and established
security personnel. They enable candidates to
understand the latest threats and technologies,
select the most appropriate equipment and
conduct methodical and effective physical
searches. Technical elements are reinforced by
hands-on sessions with the latest equipment.
Courses can be delivered either at our training
facility, offering the opportunity to conduct
physical searches of commercial and residential
environments, or at a location to suit you.
6. Equipment We Use
We hold a variety of the latest counter
surveillance equipment at our offices in
London and are able to deploy globally at
short notice. Our operational backgrounds
and experience enables us to travel to what
some might regard as challenging locations.
The enclosed list does not represent our entire
inventory and our equipment is continually
refined to keep apace with changing attack
techniques. The equipment that we use on a
day-to-day basis has been selected to provide a
balance between portability, performance and
survey location. Should our threat assessment
identify the likely use of a specific technology,
we are able to tailor the counter-measures
equipment we deploy accordingly. Our counter-
measures equipment inventory includes, but is
not limited to:
» Audiotel Scanlock M3
Advanced Counter-
Surveillance Receiver
Latest and most up to date
model in the long-running
Scanlock range. Used to detect
eavesdropping devices by rapidly
scanning through the radio
spectrum and locking onto local
transmissions. Results can be
viewed and stored in spectrum
and waterfall formats via attached
laptop computer. Automatically
identifies digital burst
transmissions, including GSM, 3G,
DECT and Wi-Fi.
» Audiotel Super-Broom Non-
Linear Junction Detector
(NLJD)
Emits a strong radio signal in order
to ‘illuminate’ nearby electronic
devices and acts like a radar to
detect them, even when they are
switched off. This device is often
used by prison authorities to locate
illicit mobile telephones.
» Audiotel Delta-V Advanced
Differential Receiver
Hand-held receiver which detects
local radio transmissions at
frequencies up to 15 GHz and
allows the user to quickly locate
their source.
» Audiotel TCM-03 Telephone
Tap Detector, plus Capacitive
Pick-up Amplifier
Allows the user to check for illicit
audio signals on telephone, data
and mains cables. Can be used
to detect audio on all forms of
cabling without the need to make
direct electrical connection.
7. » Aaronia Spectran HF-60100
Spectrum Analyser
Graphically indicates the
amplitude and frequency of radio
transmission in the area being
surveyed and, in the hands of a
TSCM technician with a developed
knowledge and understanding of
the radio spectrum and commonly
used eavesdropping frequencies,
allows him to identify and locate
suspicious transmissions amongst
the myriad electronic emissions
typically encountered in an urban
environment.
» Icom IC-R20 Communications
Receiver
Used in conjunction with Scanlock
M3 and spectrum analyser to
listen to and identify transmissions
which have been detected.
» Fluke Ti100 Thermal Imaging
Camera
A hand-held device which
generates a constantly updating
video image based upon infrared
(thermal) emissions to allow the
operator to identify sources of
heat. Assists in the rapid detection
of concealed electronic devices
in walls, ceilings and seemingly
benign objects.
» Camera Lens and Infra-Red
(IR) Detector
To assist in the detection of covert
cameras and illumination/egress
devices.
» Video Endoscope and Video
Pole Camera
To visually examine voids and
other locations where covert
eavesdropping equipment and
microphones might be concealed.
Areas typically examined include
stud walls, trunking and conduits,
furniture, ceiling voids and light-
fittings.
» Physical Search Tools
To allow removal of power sockets, data and
telephone points, keyboards, distribution
panels, mains blocks and other areas where
eavesdropping devices may be concealed. Once
checked, discreet tamper-evident seals may
be used to indicate if access has been gained
between sweeps.
In addition to the extensive array of
equipment we hold, we are passionate about
keeping up to date with the latest technology
and techniques, using this accrued knowledge
to better focus on the most likely means of
attack. We conduct various training courses for
commercial and government clients, and also
provide consultancy services aimed at ensuring
that a client can maintain and improve their
defences between scheduled surveys.
8. Intelligence | Security | Training
Ultrax Consulting Limited
29 Farm Street, London W1J 5RL
United Kingdom
+44 (0)20 7193 7460 | info@ultraxconsulting.com
www.ultraxconsulting.com