Secure phones and apps resistant to eavesdropping and monitoring software infiltration
Complete searches of the premises against eavesdropping technologies
Antidrone systems – portable and stationary
Protection against spatial eavesdropping AR-MI
PC monitoring – recording all PC user activity – measuring employee performance
Visualisation integration of operational and safety technologies
Production of special hidden monitoring technologies
Audit of security technologies and computer networks
Security technology design reviews
Architecture of building security technologies and computer network architecture
Physical extraction of data from mobile phones (password protected, gesture protected, etc.)
Encryption, identification and target location: SIM and eSIM cards, IMSI and target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is performed
IMSI catcher detectors
Revealing the real owners of “anonymous” social media accounts
Revealing the real owners of “anonymous” email addresses
“Profiling” the target in the dark – deep web environment
We collect data from a wide range of sources on the deep-dark web and can therefore provide much more information about the “target”
Levels of information go beyond the data that is stored and can be collected from social media accounts