SlideShare a Scribd company logo
1 of 8
Download to read offline
Surveillance Services
Ultrax Consulting
Ultrax Consulting Limited offers sophisticated
security solutions to clients globally, whether
in the form of proactive intelligence gathering,
preventative security measures, consultancy
advice or training. The company’s‘hunter turned
gamekeeper’approach is a clear advantage
in executing a mission statement to deliver
a genuinely high quality service, based on
proven knowledge and experience of the most
sophisticated techniques and technologies.
The company’s services include, but are not
limited to:
» Technical Surveillance Counter
Measures (TSCM)
» Covert Surveillance
» Surveillance Detection
» Cyber Security
» Security Audits
» Bespoke Training
Surveillance Services
We are a leading provider of sophisticated
surveillance related solutions and benefit
from having expertise in both offensive
and defensive techniques. Our operatives
are hand picked for their Government and
military trained surveillance backgrounds,
chosen as much for their integrity and
discretion as for their skills and experience.
Each operator is properly vetted and
understands strict need-to-know principles.
In summary, we offer truly dedicated,
discreet and fully covert surveillance
services.
Surveillance
Our teams draw upon a wealth of surveillance
knowledge, as well as specific specialist skills. A
crucial aspect is the adoption of a standardised
method of working. Uniquely, we insist upon
a clear and effective uniformity in the way
our teams operate and communicate on the
ground, and where necessary we provide
additional pre-deployment training. We can
assemble teams to meet the requirements
of most tasks, including male and female
operatives of varying age and ethnicity.
Our teams are fully equipped with covert
communication and camera equipment
and supported remotely 24 hours a day by
an operations controller. Our teams deploy
throughout the UK and overseas, in a variety
of rural and urban environments, but they are
particularly adept at operating in the extremely
challenging environs of Central London.
Detection
In addition to covert surveillance, we provide
clients with sophisticated surveillance detection
services. Our combined knowledge of advanced
surveillance methods and specialist surveillance
detection techniques is what sets us apart when
it comes to offering countermeasures advice
and training. We assist our clients in discreetly
establishing whether they, their closest family
members, or their places of residence/work are
being subjected to hostile surveillance.
There are three ways in which we do this:
Counter Surveillance – discreet protection
for those who perceive there to be a physical
threat, or potential risk of unwanted attention
from hostile surveillance.
Anti Surveillance – bespoke advice aimed
at individuals or groups who feel they may
become the target of hostile surveillance.
Technical Surveillance Counter Measures (TSCM)
– the secure sweeping of premises, vehicles,
boats and aircraft for illicit eavesdropping
devices.
Technical
Our technical teams are constantly developing
innovative and creative solutions to challenging
problems. As well as a covert observation/
command vehicle, specialised electronic
equipment such as GPS enabled devices,
vehicle tracking systems, covert cameras, and
the very latest eavesdropping devices, can be
deployed. We also offer technical solutions
which allow containers, vehicles and vessels to
be tracked electronically virtually anywhere in
the world.
Survey
We begin every operational task with
reconnaissance of the subject area. This enables
us to determine the complexity of the task,
including the amount of specialist technical
support required.
Reporting
A log is kept for the duration of each task and
is forwarded to the client on a daily basis (or
as agreed) with analysis and assessment. Time
and date stamped photographic product is also
included. A consolidated report is produced at
the end of the task and submitted along with
all unedited photographic and video product.
Video can be recorded in Mini DV, DVD or hard
disk format.
Legal
We only undertake activities that are lawful
within the jurisdiction in which we are tasked to
work. Requests to operate outside established
legal parameters will be politely declined. Until
surveillance is licensed under the Security
Industry Authority (SIA) or similar, we follow
a Code of Conduct based on the published
Code of Conduct of the Association of British
Investigators (ABI), as well as adhering to our
own ethical, professional and quality standards.
Equipment We Use
We hold a variety of the latest surveillance
equipment at our offices in Central London
and are often able to deploy at short notice.
Our teams are furnished with all the dedicated
communications equipment and specialist
technical kit required for each task. This ensures
security is kept tight, radio frequencies remain
confidential and communications compatibility
is guaranteed. Where appropriate, we provide
covert technical surveillance solutions in
support of physical surveillance operations.
Our technical capability is continually
refined to keep apace with updates in
technology.
Our surveillance equipment inventory includes,
but is not limited to:
» Covert Observation &
Command Vehicle
This custom-built commercial
vehicle in fitted with multiple
covert cameras and includes a
powerful optical zoom facility. The
vehicle offers a potential technical
solution to difficult stakeouts.
It allows us to maintain the
covert observation of a location
in circumstances where there
would be an unacceptable risk of
compromise if alternative methods
were employed. The vehicle is fitted
with digital recording equipment
that permits an operator to either
remain within it, whilst monitoring
the camera feeds, or for it to be
unmanned and the product
viewed remotely via a secure
wireless link.
» Motorola GP344 VHF Body
Borne Radios
These radios operate at short range
on our dedicated Ofcom licensed
frequencies. The combination of
limited footprint and disciplined
communication procedures
(including the use of a coded
glossary) enables our teams
to communicate securely and
effectively on the ground without
the loss of performance that is
common with encrypted radios.
» Motorola GM340 VHF
Vehicle Radios
Despite advances in technology,
analogue communications
equipment still offers a distinct
advantage over digital when it
comes to surveillance. An analogue
signal has slow fade, which
enables an operator to better judge
the distance and direction between
themselves and the lead person or
vehicle in a follow, whereas digital
signals drop straight out when the
signal strength weakens.
» Sonic Covert Wires/PTT
These covert wires operate in
conjunction with the GP344
body borne radios and are worn
concealed under clothing.
» Sonic Wireless Earpieces
Fully covert, pea-sized wireless
earpieces, which create an
inductive loop with the body borne
covert wires.
» Radio Harnesses
Enable operators to wear
communications equipment
covertly under clothing.
» Covert Cameras
Hidden cameras, such as key fob
cameras, which provide time
and date stamped video and still
photography.
» Covert HD Video Cameras
Easily portable and discreet devices
that can be deployed during close
contact work.
» Long Lens Cameras with
Infra-Red (IR) Technology
For long distance and low light
coverage of an individual, premises
or location - only used out of sight
of the intended subject.
» Audio Recording Devices
Disguised as everyday items and
deployed during close contact with
the subject.
» Concealing Devices
We are constantly developing
methods for concealing and
disguising fixed or mobile cameras.
Intelligence | Security | Training
Ultrax Consulting Limited
29 Farm Street, London W1J 5RL
United Kingdom
+44 (0)20 7193 7460 | info@ultraxconsulting.com
www.ultraxconsulting.com

More Related Content

What's hot

Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...Dieter Moll
 
Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Axis Communications
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Company Profile - SYNCHRONOS
Company Profile - SYNCHRONOSCompany Profile - SYNCHRONOS
Company Profile - SYNCHRONOSinfo-sync
 

What's hot (9)

Video surveillance
Video surveillanceVideo surveillance
Video surveillance
 
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
Rcs sec 012-08-2014 - program schedule + course outline - (maritime security)...
 
Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505
 
Mr8322 x
Mr8322 xMr8322 x
Mr8322 x
 
Cctv surveillance system | Unisol
Cctv  surveillance system | UnisolCctv  surveillance system | Unisol
Cctv surveillance system | Unisol
 
Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505Ppt safecities axis_ agentvi_jvp_en_1505
Ppt safecities axis_ agentvi_jvp_en_1505
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
MVS Security Presentation
MVS Security PresentationMVS Security Presentation
MVS Security Presentation
 
Company Profile - SYNCHRONOS
Company Profile - SYNCHRONOSCompany Profile - SYNCHRONOS
Company Profile - SYNCHRONOS
 

Similar to Surveillance Services

TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-SweepingPaul Andrews
 
Securitas Generic Mobile
Securitas Generic MobileSecuritas Generic Mobile
Securitas Generic MobileMarkPridmore
 
Group CSC Brochure English 2015
Group CSC Brochure English 2015Group CSC Brochure English 2015
Group CSC Brochure English 2015Bill Strobel
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Xerxes Oosthuizen
 
Securex product profile
Securex product profileSecurex product profile
Securex product profileBrian Sagala
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017Riaan Bellingan
 
Optimum Security Information
Optimum Security InformationOptimum Security Information
Optimum Security InformationHosea Kahiga
 
Optimum Security Info Doc
Optimum Security Info DocOptimum Security Info Doc
Optimum Security Info DocHosea Kahiga
 
Optimum Security Info Doc
Optimum Security Info DocOptimum Security Info Doc
Optimum Security Info DocHosea Kahiga
 
Algiz security corporate services presentation web 2016
Algiz security   corporate services presentation web 2016Algiz security   corporate services presentation web 2016
Algiz security corporate services presentation web 2016Sascha Kunkel
 
ALGIZ Security - Corporate Services Presentation WEB 2016
ALGIZ Security - Corporate Services Presentation WEB 2016ALGIZ Security - Corporate Services Presentation WEB 2016
ALGIZ Security - Corporate Services Presentation WEB 2016Sascha Kunkel
 
Superserve Profile 2016
Superserve Profile 2016Superserve Profile 2016
Superserve Profile 2016Kelvin Kyambo
 
Brochure TS English
Brochure TS EnglishBrochure TS English
Brochure TS EnglishDiego Amado
 

Similar to Surveillance Services (20)

TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
Securitas Generic Mobile
Securitas Generic MobileSecuritas Generic Mobile
Securitas Generic Mobile
 
TFS Brochure 1_HUB
TFS Brochure 1_HUBTFS Brochure 1_HUB
TFS Brochure 1_HUB
 
Group CSC Brochure English 2015
Group CSC Brochure English 2015Group CSC Brochure English 2015
Group CSC Brochure English 2015
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
 
Securex product profile
Securex product profileSecurex product profile
Securex product profile
 
TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017TSCM - Technical Surveillance Counter Measures July 2017
TSCM - Technical Surveillance Counter Measures July 2017
 
Optimum Security Information
Optimum Security InformationOptimum Security Information
Optimum Security Information
 
Optimum security info doc
Optimum security info docOptimum security info doc
Optimum security info doc
 
Optimum Security
Optimum SecurityOptimum Security
Optimum Security
 
Optimum Security Info Doc
Optimum Security Info DocOptimum Security Info Doc
Optimum Security Info Doc
 
Optimum Security Info Doc
Optimum Security Info DocOptimum Security Info Doc
Optimum Security Info Doc
 
Algiz security corporate services presentation web 2016
Algiz security   corporate services presentation web 2016Algiz security   corporate services presentation web 2016
Algiz security corporate services presentation web 2016
 
ALGIZ Security - Corporate Services Presentation WEB 2016
ALGIZ Security - Corporate Services Presentation WEB 2016ALGIZ Security - Corporate Services Presentation WEB 2016
ALGIZ Security - Corporate Services Presentation WEB 2016
 
Superserve Profile 2016
Superserve Profile 2016Superserve Profile 2016
Superserve Profile 2016
 
LIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILELIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILE
 
LIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILELIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILE
 
Brochure TS English
Brochure TS EnglishBrochure TS English
Brochure TS English
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 

Surveillance Services

  • 2. Ultrax Consulting Ultrax Consulting Limited offers sophisticated security solutions to clients globally, whether in the form of proactive intelligence gathering, preventative security measures, consultancy advice or training. The company’s‘hunter turned gamekeeper’approach is a clear advantage in executing a mission statement to deliver a genuinely high quality service, based on proven knowledge and experience of the most sophisticated techniques and technologies. The company’s services include, but are not limited to: » Technical Surveillance Counter Measures (TSCM) » Covert Surveillance » Surveillance Detection » Cyber Security » Security Audits » Bespoke Training
  • 3. Surveillance Services We are a leading provider of sophisticated surveillance related solutions and benefit from having expertise in both offensive and defensive techniques. Our operatives are hand picked for their Government and military trained surveillance backgrounds, chosen as much for their integrity and discretion as for their skills and experience. Each operator is properly vetted and understands strict need-to-know principles. In summary, we offer truly dedicated, discreet and fully covert surveillance services. Surveillance Our teams draw upon a wealth of surveillance knowledge, as well as specific specialist skills. A crucial aspect is the adoption of a standardised method of working. Uniquely, we insist upon a clear and effective uniformity in the way our teams operate and communicate on the ground, and where necessary we provide additional pre-deployment training. We can assemble teams to meet the requirements of most tasks, including male and female operatives of varying age and ethnicity. Our teams are fully equipped with covert communication and camera equipment and supported remotely 24 hours a day by an operations controller. Our teams deploy throughout the UK and overseas, in a variety of rural and urban environments, but they are particularly adept at operating in the extremely challenging environs of Central London.
  • 4.
  • 5. Detection In addition to covert surveillance, we provide clients with sophisticated surveillance detection services. Our combined knowledge of advanced surveillance methods and specialist surveillance detection techniques is what sets us apart when it comes to offering countermeasures advice and training. We assist our clients in discreetly establishing whether they, their closest family members, or their places of residence/work are being subjected to hostile surveillance. There are three ways in which we do this: Counter Surveillance – discreet protection for those who perceive there to be a physical threat, or potential risk of unwanted attention from hostile surveillance. Anti Surveillance – bespoke advice aimed at individuals or groups who feel they may become the target of hostile surveillance. Technical Surveillance Counter Measures (TSCM) – the secure sweeping of premises, vehicles, boats and aircraft for illicit eavesdropping devices. Technical Our technical teams are constantly developing innovative and creative solutions to challenging problems. As well as a covert observation/ command vehicle, specialised electronic equipment such as GPS enabled devices, vehicle tracking systems, covert cameras, and the very latest eavesdropping devices, can be deployed. We also offer technical solutions which allow containers, vehicles and vessels to be tracked electronically virtually anywhere in the world. Survey We begin every operational task with reconnaissance of the subject area. This enables us to determine the complexity of the task, including the amount of specialist technical support required. Reporting A log is kept for the duration of each task and is forwarded to the client on a daily basis (or as agreed) with analysis and assessment. Time and date stamped photographic product is also included. A consolidated report is produced at the end of the task and submitted along with all unedited photographic and video product. Video can be recorded in Mini DV, DVD or hard disk format. Legal We only undertake activities that are lawful within the jurisdiction in which we are tasked to work. Requests to operate outside established legal parameters will be politely declined. Until surveillance is licensed under the Security Industry Authority (SIA) or similar, we follow a Code of Conduct based on the published Code of Conduct of the Association of British Investigators (ABI), as well as adhering to our own ethical, professional and quality standards.
  • 6. Equipment We Use We hold a variety of the latest surveillance equipment at our offices in Central London and are often able to deploy at short notice. Our teams are furnished with all the dedicated communications equipment and specialist technical kit required for each task. This ensures security is kept tight, radio frequencies remain confidential and communications compatibility is guaranteed. Where appropriate, we provide covert technical surveillance solutions in support of physical surveillance operations. Our technical capability is continually refined to keep apace with updates in technology. Our surveillance equipment inventory includes, but is not limited to: » Covert Observation & Command Vehicle This custom-built commercial vehicle in fitted with multiple covert cameras and includes a powerful optical zoom facility. The vehicle offers a potential technical solution to difficult stakeouts. It allows us to maintain the covert observation of a location in circumstances where there would be an unacceptable risk of compromise if alternative methods were employed. The vehicle is fitted with digital recording equipment that permits an operator to either remain within it, whilst monitoring the camera feeds, or for it to be unmanned and the product viewed remotely via a secure wireless link. » Motorola GP344 VHF Body Borne Radios These radios operate at short range on our dedicated Ofcom licensed frequencies. The combination of limited footprint and disciplined communication procedures (including the use of a coded glossary) enables our teams to communicate securely and effectively on the ground without the loss of performance that is common with encrypted radios. » Motorola GM340 VHF Vehicle Radios Despite advances in technology, analogue communications equipment still offers a distinct advantage over digital when it comes to surveillance. An analogue signal has slow fade, which enables an operator to better judge the distance and direction between themselves and the lead person or vehicle in a follow, whereas digital signals drop straight out when the signal strength weakens.
  • 7. » Sonic Covert Wires/PTT These covert wires operate in conjunction with the GP344 body borne radios and are worn concealed under clothing. » Sonic Wireless Earpieces Fully covert, pea-sized wireless earpieces, which create an inductive loop with the body borne covert wires. » Radio Harnesses Enable operators to wear communications equipment covertly under clothing. » Covert Cameras Hidden cameras, such as key fob cameras, which provide time and date stamped video and still photography. » Covert HD Video Cameras Easily portable and discreet devices that can be deployed during close contact work. » Long Lens Cameras with Infra-Red (IR) Technology For long distance and low light coverage of an individual, premises or location - only used out of sight of the intended subject. » Audio Recording Devices Disguised as everyday items and deployed during close contact with the subject. » Concealing Devices We are constantly developing methods for concealing and disguising fixed or mobile cameras.
  • 8. Intelligence | Security | Training Ultrax Consulting Limited 29 Farm Street, London W1J 5RL United Kingdom +44 (0)20 7193 7460 | info@ultraxconsulting.com www.ultraxconsulting.com