Menú

Your peace of mind is our concern

TSCM
SERVICES

Our Company

We come from the world of telecommunications and military intelligence.

We detect, locate, and remove all kind of audio bugs, hidden cameras, recorders and GPS trackers. We also make your meetings safe and private by means of electronic protection equipment. Know what we can do to protect yout interests.

Our

Áreas & Keys.

We are professionals in intelligence, electronics and communications fields. Appart from that, we are private investigators, security managers, and qualified security trainers. Know our most important keys that makes the difference.

Training

Our training is universitary, (Naval Radioelectronic Engineering, B.Sc), widened with postgraduate degrees in design and implementation of networks (Cisco Systems) and supplemented with specific training in mobile cybersecurity (INCIBE), which allow us to have a global view of almost any threat.

Experience

We have more than eleven years of experience in telecommunications multinational corporations, as part of technical projects (implementation, deployment and operation) of nationwide security and safety networks. We also have experienced staff coming from the intelligence community.

Auditing

Our TSCM Audits are not only focused exclusively on locating and removing all kinds of technically-sourced attack vectors, but we also examine site location, structure and business operations prior to the TSCM works, in order to obtain a global view of the problems and apply appropriate solutions.

Technology

We have specific and specialized technical equipment for TSCM audits, but we also make extensive use of professional range, lab-grade equipment, that allows us to detect, isolate, report, and characterize all types of signals in nearly any way capable of transporting information.

Consultancy

In addition to our technical training, we also have professional qualifications as Security Managers and Private Investigators. We carry out, if required by our clients, a meticulous assessment of security risks - technical, human and organizational - that are usually associated with static or "in motion" scenarios.

Protection

Our vision is not only active, locating technical attack vectors, but we also act pre-emptively and reactively, creating safe spaces and rooms protected from surreptitious audio recordings and hostile transmission of radio frequency signals that could seriously compromise your corporate interests and privacy.

Equipment

Our means & instruments.

These are just a part of the different techniques and means that help us to locate, isolate, characterize and neutralize technical-driven attack vectors.

Radio frequency spectrum analysis

By using professional and lab grade, realtime spectrum analyzers, we can capture and analyze even the most weak and short radio signal. No matter what kind of technology is being used to modulate: frequency hopping, bursting signals, etc. Contact Us

Infrared termography

With infrared spectrum analysis we can detect and find thermal fingerprint of hidden devices when they are powered and in service. Contact Us

Non linear junction detection

Using this kind of devices called "non linear junction detectors" is possible for us to find hidden electronic devices containing semiconductors (even in they are not working or not powered), when they hidden inside a wall or any kind of furniture.. Contact Us

Network & line inspection

Network cables and telephone lines are the most useful vector to transmit and exfiltrate information. We use lab-grade equipment to detect, locate and characterize all kind of hostile signals in almost all kind of cables no matter if they are powered or in service. Contact Us

Physiscal inspection

The most important part of a TSCM inspection. Where is not a 100% technical threat, a physical inspection conducted by skilled team comes essential to find and eliminate what is technically impossible to locate by electronic means. Contact Us

Technical threats

We have the most advanced software and hardware designed to analyze network protocols. Not only we can detect hidden devices and bugs, but we also control and intercept network traffic in search of software driven suspicious activities. Contact Us

Our key

"Our training and equipment makes the difference. But, avobe all, our dedication and discretion."

Messaging & Social.

Secure messaging platforms & social media.

Contact

Send us a free consultation.

Don't forget to contact us by using safe equipment in a controlled environment you trust.

Send us a message
I've read and accept this site's legal terms.
Sending...
Your message has been sent. Thank you.
Contact information
where we are

Camino de Ronda, St.
Granada, Andalucía
18003 Spain

Email

info@tscm.io
info@contramedidas.net [Spa]

Call us

Tel: (+34) 644 400 030
Threema ID: PJRN8TTM