Security technology and IT security experts

Our services:

Secure phones and apps resistant to eavesdropping and monitoring software infiltration

Complete searches of the premises against eavesdropping technologies

Antidrone systems – portable and stationary

Protection against spatial eavesdropping AR-MI

PC monitoring – recording all PC user activity – measuring employee performance

Visualisation integration of operational and safety technologies

Production of special hidden monitoring technologies

Audit of security technologies and computer networks

Security technology design reviews

Architecture of building security technologies and computer network architecture

Physical extraction of data from mobile phones (password protected, gesture protected, etc.)

Encryption, identification and target location: SIM and eSIM cards, IMSI and target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is performed

IMSI catcher detectors

Revealing the real owners of “anonymous” social media accounts

Revealing the real owners of “anonymous” email addresses

“Profiling” the target in the dark – deep web environment

We collect data from a wide range of sources on the deep-dark web and can therefore provide much more information about the “target”

Levels of information go beyond the data that is stored and can be collected from social media accounts