TECHNICAL SURVEILLANCE COUNTERMEASURES

Play Video

The FBI’s assessment reveals that non-health insurance fraud comes at a staggering annual price tag exceeding $40 billion. Regrettably, this financial burden trickles down to the average American family, costing them an additional $400 to $700 each year through elevated premiums.

 

At Axios Investigations Firm, our highly skilled personnel have over 10 years of SIU and Insurance Claims Investigations experience. Our cutting-edge technology and insurance expertise come together to offer clients optimal service and tailored solutions that cater to their specific needs.

With these advances, we are more aware of our environment. Which has led us to be a more litigious society holding individuals to higher standards. To survive in our modern-day high-tech society, we now must consider and not overlook many things that were not previously in the equation. We must consider things such things as:

Corporate Espionage

Non-Disclosure Agreements

Non-Compete Agreements

Privacy Concerns

Secrecy Issues

Due Diligence

Intellectual Property Protection

Confidentially in Merger and Acquisitions

Protect Stockholders

High Profile Individuals

In the early days, of Countermeasures in the private sector, many believed they were protected with a sweep being conducted utilizing a low-tech handheld RF scanner and handheld telephone scanner. This is no longer the standard for countermeasures that are conducted today. Today, highly trained individuals utilize highly specialized and technical equipment and procedures to detect and identify clandestine compromises to a business or individual’s security.

The private sector and government agencies are now facing many modern-day issues and concerns that were not present in the twentieth century. Corporations and individuals are much more aware and concerned about protecting their physical and intellectual property. This is especially due to COVID-19 concerns. Companies and corporations are allowing more people to work from home. While convenient for many employees and executives, this could potentially add additional security threats. Companies and Governments focus on internal threats such as computer hacking and virus threats using secured servers or VPN’s. However, meetings are still being held in an unsecured location such as homes, apartments, or hotels. Increasing the opportunity for Intellectual Property (IP) theft or sensitive information to be heard. While governments or large organizations use SCIF’s (Sensitive Compartmented Information Facility) to hide their discussions, unfortunately, people from home do not have that luxury.

The Equipment

For professional TSCM / Cyber TSCM surveys to be effective, the TSCM specialist must be expertly trained and properly equipped. Eavesdroppers utilize a variety of devices and spying tactics to exploit vulnerabilities in your security protocols. They intend to access and utilize your valuable information.

Axios Investigations Firm’s eavesdropping detection equipment is constantly upgraded to meet new and emerging technical surveillance threats. This practice ensures that we are prepared and fully capable of handling all known threat levels as well as the continuous technological advancements with regards to covert Technical Surveillance Devices (TSD), Technical Security Hazards (TSH), espionage methods, techniques, compromises, and the more common non-electronic methods of compromise.

Some Of The Equipment Used:

REI Oscar Green

The OSCOR Green is a portable spectrum analyzer that sweeps 24 GHz in one second to quickly detect transmitting electronic surveillance devices and ensure that spectrum activity is captured.

JJN Digital Non-Linear Junction Detector

The ORION 900 HX NLJD is made to detect and locate hidden cameras, microphones, and other electronic devices regardless of whether the surveillance device is radiating, hard wired, or turned off.

JJN Cam GX5 Cellular Activity Monitor

The CAM-GX5 is designed to detect and locate transmissions from cellular mobile phone-based devices including mobile phones, smartphones, vehicle trackers, Wi-Fi Hotspots, GSM listening devices (bugs) and covert wireless 3G/4G/5G cameras.

Yorkie Pro

Yorke-Pro sweeps all nearby Cellular, Wi-Fi, Bluetooth and BLE (Bluetooth Low Energy) channels using a high-speed receiver engine in conjunction with a Wi-Fi/BT/BLE demodulator.

Optic 2 Hidden Camera Detector

“Optic-2” is a professional hidden camera detector designed to detect and locate hidden or camouflaged camcorders and pinhole cameras, regardless of their status.

C3 Thermal Imaging System

Portability Pocket Portable Thermal Camera with Msx Enhanced Thermal Images providing stunning detail to help you identify problems.

Data Pilot 10

Data Pilot 10 aims to make it easier for digital forensic examiners to acquire evidence from mobile devices in the field and analyse it back in the lab.

IPROTECT DIGITAL RF DETECTOR

The Protect 1206i is a new class of counter surveillance device. Unlike all typical searching devices it can detect modern ‘hidden’ bugs.

Operational Capabilities

Our Qualifications

Axios Investigations Firm has over 25 years of well-rounded domestic/international experience as Technical Security Countermeasures (ITC Trained) and Security & Espionage Investigators. Our Special Agents have been at the federal, corporate, and state levels. Having served prestigiously at the National Security Agency, U.S. Special Forces, SWAT, the Drug Enforcement Administration, and BLACKWATER, USA.

Axios Investigations Firm conducts on-site assistance visits for physical security inspections, vulnerability assessments, and Technical Surveillance Countermeasures surveys at various locations throughout the USA and abroad. We also have Active Top-Secret Clearance with previous SCI clearances.