Hire ComSec, The Process

Below is the recommended process for hiring ComSec. Please follow these steps:

COMSEC-150x15011). DO NOT discuss your suspicions with anyone within your circle of influence.

2). Contact us from a place outside of your area of concern.

3). If you will be contacting us by phone, use a safe phone away from your office or home, i.e. use a friend’s phone, pay phone, etc. Or purchase a “trac phone” or “throw away” pre-paid phone from a grocery store or chain store (i.e. Walmart, Best Buy, Radio Shack, etc.) Call us at 1-800-615-0392
You can also reach us on Silent Circle @ COMSEC

4). If you feel there is a possibility that your computer or mobile device has been compromised, then use a computer or mobile device other than your own when possible (i.e. friend’s computer, library, cyber cafe, etc.) to Contact ComSec.

5.) We recommend that you create a “sterile e-mail address” (i.e. Yahoo, Gmail, etc.), and use this email for all correspondence with ComSec.

6) Complete our secure contact form, referencing your sterile email address and the appropriate phone number.

What Happens Next:

a) ComSec will review your contact form and contact you by the method identified on your form.

b) ComSec will prepare a service quote/service agreement, and provide you with additional information about our company and services as requested.

c) Upon receipt of the signed quote and payment, ComSec will schedule your service for the agreed day/time, and make travel arrangements.

d) We will provide you with our travel details.

e) You must provide us with arrival instructions, point of contact information, etc. specific to your needs for our arrival. We typically recommend meeting in a public place near the survey area to discuss the process we follow when on site.

inter-e1413663822576