Eavesdropping Detection Equipment

Eavesdropping Detection Equipment

Technologically Advanced – Field Tested – Highly Trained Experts

For professional TSCM / Cyber TSCM surveys to be effective, the TSCM specialist must be expertly trained and properly equipped. Eavesdroppers utilize a variety of devices and spying tactics to exploit vulnerabilities in your security protocols. Their intent is to access and utilize your valuable information.

A professional TSCM / Cyber TSCM service provider ensures the knowledge and skills of its specialists and the eavesdropping detection equipment utilized are capable of detecting spying devices and exposing eavesdropping tactics. Professional TSCM service providers are aware that electronic eavesdropping devices and tactics are continually evolving. In order to provide thorough and effective TSCM services, the professional TSCM service provider must ensure their specialists, equipment and processes continually evolve to address the emerging threats.

ComSec’s eavesdropping detection equipment is constantly upgraded to meet new and emerging technical surveillance threats. This practice ensures that we are prepared and fully capable of handling all known threat levels as well as the continuous technological advancements with regards to covert Technical Surveillance Devices (TSD), Technical Security Hazards (TSH), espionage methods, techniques, compromises and the more common non-electronic methods of compromise.

ComSec carefully analyzes each individual survey assignment and selects different combinations of equipment, inspection methods and techniques as required for both known and developing threat levels.

Commercial – Unclassified

Eavesdropping Detection Equipment

ComSec LLC utilizes the following commercial, unclassified eavesdropping detection equipment for its professional, commercial eavesdropping detection services. Below is a partial list of our equipment resources.


oscor-green-spectrum-analyzer

 

 

REI OSCOR Green (24 GHz) TSCM Spectrum Analyzer:

The OSCOR Green is designed for commercial applications to detect illicit eavesdropping signals, perform site surveys for communication systems, conduct radio frequency (RF) emissions analysis, and investigate misuse of the RF spectrum. OSCOR Green scans 24GHz in one (1) second ensuring spectrum activity is captured, which is the equivalent of capturing 2,000,000 data points per second.

 

 


KESTREL TSCM PRO SOFTWARE. (Click Here for pdf).

KESTREL SURFACE RF LOCATOR Shown in photo. (Click Here for pdf).

The Kestrel TSCM Pro Equipment Software Application Interfaces, Wireless Network Analysis Technology, GPS Mapping and Logging Tools, RF Spectrum (Real Time and Post Analysis) Software, Global Frequency Database and a Proprietary Telephone, Video Conferencing, Voice, Data and Wireless Systems Engineering Reference Database. Kestrel TSCM Professional Software (Click here for pdf)– Signal Intelligence Support System (SISS) (BB60A-6.0 GHz) / (12.4 GHz) Dual / Multiple Receiver with Remote Surveillance and Monitoring Capability, Differential Signal Analysis (DSA) and advanced Threat Level Programming (TLP). ComSec is the exclusive authorized distributor of KESTREL TSCM PRO SOFTWARE & THE KESTREL SURFACE RF LOCATOR in the United States of America.

 

orion-2-4

 

 

REI – ORION 2.4GHz Non-Linear Junction Detector (NLJD). A Non-Linear Junction Detector detects the presence of electronics, regardless of whether the electronic target is radiating, hard wired, or even turned off. The ORION 2.4 locates hidden electronics in walls, floors, ceilings, fixtures, furniture, or containers. An antenna-mounted line-of-sight display lets the operator focus on the target while sweeping.  The NEW ORION 2.4 transmits at 2.4GHz frequency for detecting small electronics such as SIM cards and cell phones.

 

 

 

REI TALAN-01REI TALAN DPA 7000 Telephone and Line Analyzer. The TALAN incorporates several types of telephone line tests including common tests such as voltage, current, resistance, and capacitance tests, as well as NLJD, FDR Frequency Domain Reflectometry, and Digital Demodulation technology into a single piece of equipment. Voice-over Internet Protocol (VoIP) phone systems present a new form of security risk to communications. With new enhancements built into the TALAN software interface, users can now test internet protocol (IP) packet traffic on VoIP phones and systems. VoIP data collected by the TALAN software includes Source and Destination Mac Addresses; header type; statistics – total packets; packet rate; peak rate and run time.

 

 

FLIR E8 & E60 Thermal Imaging Camera, 320 x 240 IR-MSX Resolution.

Multi-Spectral Dynamic Imaging (MSX) for easier interpretation of an image – adds visible spectrum definition to IR images by detecting the edges of objects and including that detail in the thermal image. Text becomes clearly visible so that you can read a label or identifier within the IR image. This exclusive function provides extraordinary thermal detail that instantly highlights and orients problem locations and eliminates the need to refer back to a visual image for detail.

 

 

ANDRE – Counter Surveillance Broadband Receiver. The ANDRE is a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters. Quickly and discretely mitigate threats using the ANDRE Advanced Kit’s wide range of accessories specifically designed to receive transmissions across a 1 kHz to 6 GHz frequency range. ANDRE. It is an excellent complement to an OSCOR Spectrum Analyzer as a preliminary non-alerting tool.

 

 

 

 

 

 

VPC-64 Pole Camera. Inspect drop ceilings, behind immovable objects, around corners, or other difficult to reach areas, even in dark situations with the VPC-64 or the VPX-64 Video Pole Camera. The VPC-64’s 24 in (61 cm) pole extends to over 6 ft (1.8 m) giving the average user over 10 ft (3 m) of reach.

 

 

 

Wolfhound-Pro(hi-res)Wolfhound Pro. Wolfhound-PRO Cell Phone Detector is a precision, handheld, wireless sniffer specifically tuned to the RF signature of common cell phones (both U.S. & international bands) including LTE, AWS, PCS, CDMA / WCDMA (UMTS), GSM, EGSM Cellular bands as well as GPS trackers and even U.S. DECT 6.0 cordless phones that cause interference with European cellular carriers. Wolfhound™-PRO’s award-winning*, high speed scanning receiver utilizes a multi-band DF (Direction Finding) antenna system allowing  TSCM Specialists to locate nearby cell phones in either standby mode* or during active voice, text or data RF transmissions. Wolfhound-PRO™ identifies each cellphone by frequency allowing for detection and listing of multiple cellphones. Wolfhound-PRO has up to 150 foot radius for cell phone detection (indoors) and up to 1 mile outdoors (line-of-sight) making it the most sensitive cell phone detector on the market. Wolfhound-PRO™is designed and manufactured in the U.S.A

 

 

GSMK CP500i CRYPTOPHONE. This device is designed to provide information about whether you are in an area that is under surveillance using cellular interceptors (IMSI Catchers, StingRays, etc.) to compromise your device. The GSMK CryptoPhone 500i is an Android-based secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. The Baseband Firewall protects the microchip in your Crypto-Phone that manages the communication with the mobile network, the so-called baseband chip, against attacks. Baseband firewall 2.0 • Unique protection against over-the-air attacks with constant monitoring of baseband processor activity • Baseband attack detection and initiation of countermeasures • Detection of attempts to track the user’s location via SS7 or silent SMS.

The Baseband Firewall was programmed to recognize certain patterns of phone behavior, will notify you if it detects too many suspicious events and will then reset the baseband chip to get rid of possible attack malware. It will also detect any attempt to force the CryptoPhone’s base band to connect to a rogue base station (e.g. a so-called IMSI Catcher) by providing manipulated network parameters and notify you if such a situation occurs.

 

 

esd-overwatch-sensor-1

ESD Overwatch: Wireless Network – Cellular Network Analysis. 

ComSec is the exclusive US commercial partner for the ESD Overwatch system. We use the Overwatch system to detect and monitor cellular attacks in real-time, and to identify IMSI catchers/StingRay, baseband processor attacks, rogue base stations and cellular jamming. The system generates a continuously updated, national situation report by means of distributed detection and localization of a multitude of baseband attacks as well as the manipulation of cellular signaling.

Essentially, the information generated by the Overwatch system arms corporate decision makers with the tools to eliminate illegal use of IMSI catchers/STINGRAYS. The system uses a military-grade waterproof sensor for comprehensive and continuous detection in fixed or mobile installations. This exclusive capability is now included in ComSec’s TSCM/Cyber TSCM Services and Assurance Option Programs.

 

CELLEBRITE UFED Touch Ultimate. All-inclusive Mobile Forensic Solution. Setting the industry standard for mobile data forensic solutions. UFED Touch Ultimate, enables the most technologically advanced extraction, decoding, analysis and reporting of mobile data. It performs physical, logical, file system and password extraction of all data (even if deleted) from the widest range of devices including legacy and feature phones, smartphones, portable GPS devices, tablets and phones manufactured with Chinese chipsets.

 

CELLEBRITE Physical Analyzer. The UFED Physical Analyzer is the most powerful and technologically advanced mobile forensic application available. It exposes every segment of a device’s memory data and provides in-depth decoding, analysis and reporting methods. Features include: Malware Detection – On-demand searches for viruses, spyware, Trojans and other malicious payloads in fi­les, Project Analytics – View statistics on communications and identifying relationship strengths Rich Set of Data – Includes calendar, call logs, contacts, SMS, MMS, chats, applications etc. The advanced application for decoding, analysis and reporting.

 

AirCheck

 

FLUKE AirCheck Wireless WiFi Analyzer. Detect and locate 802.11ac APs; validate connectivity to 802.11ac infrastructure, One-button AutoTest quickly provides a pass/fail indication of the wireless environment and identifies common problems, See wireless network utilization by channel and quickly determine if it is 802.11 traffic or non-802.11 interference, Quickly identify and locate wireless access points whether authorized or rogue, etc.

 

CMA-100_2CMA-100 – Countermeasures Amplifier. The Countermeasures Amplifier (CMA-100) is a high gain audio amplifier used to detect and identify certain types of surveillance devices attached to building wiring such as telephone wiring, LAN and server systems, AC Power, Alarm wire etc. The CMA-100 is designed to provide flexable features and will prove to be very useful in many situations.

 

 

 

 

pluse-sensor

PULSE – Wired, Wireless & Bluetooth Device Threat Detection. Continuous device monitoring, analytics, and threat detection.

The Pulse distributed architecture detects all wired, wireless, and Bluetooth devices across your entire organization and alerts for unauthorized, vulnerable, rogue, and suspicious devices and access points. Plug-and-play sensors are deployed across your organization and connect back to our SaaS console that provides the dashboards, reporting, alerting and centralized management. Pulse provides continuous visibility from a centralized management console throughout the wired, WiFi, and Bluetooth spectrums and detects rogue, misconfigured, and unauthorized wireless and wired devices on or around the network.

screen-shot-2017-01-10-at-12-30-06-pm

 

*Classified-ITAR Controlled-Restricted

Eavesdropping Detection Equipment

* Available to US Government and US Military Clients Only.

ComSec owns and operates additional TSCM and Cyber TSCM equipment and proprietary software programs that are not listed above for a variety of security related reasons. These additional equipment resources are utilized where the threat level of the target area requires extraordinary OPSEC and additional inspection methods to be utilized.

When selecting a TSCM / Cyber TSCM service provider, utilizing a professional TSCM company with expertly trained specialists, advanced field tested TSCM equipment and an extensive knowledge of current spying devices, threats and effective detection methods is the only choice. Contact ComSec LLC today or call us at: +1.800.615.0392 for professional TSCM / Cyber TSCM services.

Global Counterespionage Specialists

Certified Counterespionage Information Security Management – CCISM

Licensed, Insured and Certified TSCM Service Provider | USA Nationwide | Worldwide Services.

 

globaltscm2

ComSec Eavesdropping Detection Services available USA Nationwide in  Alabama – AL, 
Alaska – AK, Arizona – AZ, 
Arkansas – AR,
 California – CA,
 Colorado – CO, Connecticut – CT,
 Delaware – DE, 
District of Columbia – DC,
 
Florida – FL,
 Georgia – GA,
 Guam – GU,
 Hawaii – HI,
 Idaho – ID,
 Illinois – IL, 
Indiana – IN,
 Iowa – IA,
 Kansas – KS,
 Kentucky – KY,
 Louisiana – LA, 
Maine – ME,
 Marshall Islands – MH,
 Maryland – MD,
 Massachusetts – MA,
 Michigan – MI,
 Minnesota – MN, 
Mississippi – MS,
 Missouri – MO,
 Montana – MT,
 Nebraska – NE,
 Nevada – NV,
 New Hampshire – NH,
 New Jersey – NJ,
 New Mexico – NM,
 New York – NY,
 North Carolina – NC,
 North Dakota – ND,
Ohio – OH,
 Oklahoma – OK,
 Oregon – OR, 
Pennsylvania – PA,
 Puerto Rico – PR,
 Rhode Island – RI,
 South Carolina – SC,
 South Dakota – SD,
 Tennessee – TN,
 Texas – TX,
 Utah – UT,
 Vermont – VT,
 Virgin Island – VI,
 Virginia – VA,
 Washington – WA,
 West Virginia – WV,
 Wisconsin – WI,
 Wyoming – WY, Washington, D.C. , World-Wide Services.