our services
Our Top Services
Technical Surveillance and Countermeasures and Forensics
The quest for illicit intelligence is a never-ending threat; from criminals trying to obtain information for financial gain, to sophisticated state-sponsored adversaries looking for political and military gains. While we do not always know what kind of threats are around us, a robust security policy encompassing physical security, cyber security and protection from electronic surveillance is needed to ensure secrets remain secret. The security of your building, your Sensitive Compartmented Information Facility (SCIF), your private conversations, your plans and secrets can all be compromised by surveillance devices; from small, inexpensive GSM/UMTS bugs to bespoke devices created by state actors.
- Collection of Digital Forensics Evidence
- Cell phone Digital Forensics
- Providing with screenshots of anything found.
- Penetration testing
- Writing a detailed report
- Can give answers to questions asked regarding the case/Forensics study
- Can recover deleted files on computers and cell phones.
- Recover hidden text messages from any image
- Physical Security Access and Social Engineering training and consulting
- Physical and Electronic Penetration Testing
- Can recover deleted images
- Can recover deleted videos
- Can recover deleted audio files
- Can recover deleted.exe, .mp3, .mp4, .docx, .EO1 and any other types of file
- Detailed coverage maps
- OS Forensics
- Steganography Recovery
- Spotting electronic surveillance equipment training and consulting
PUBLIC SAFETY RF CONSULTING/SME
We can assist our customers with the following type of radio projects:
- What is the best frequency spectrum?
- Advantages and disadvantages of the various options.
- Mobile and camera bandwidth requirements.
- Advantages and disadvantages of a digital trunking systems.
- Operational Issues
- Proper use of channels
- Proper use of command channels and talk groups
- Understand the Communication Order Model components of Connect, Convey, Clarify,
- Coverage Talk Out/In
- Radio coverage and towers (locations, heights and load).
- Radio system redundancy
- Radio system maintenance contracts
- The best location for sites
- Building DAS (Distributed Antenna Systems) design, spec and install oversight
- Dispatch consoles
- Needs assessment
- Procurement
- Implementation
- Radio system
- Needs Assessment
- Procurement
- Implementation
- Number of talk paths required to support the client’s needs
- Cost and benefits of microwave compared to the fiber loop
- Governance plans and or issues
- Confirm
- Detailed coverage maps
Expert witness services for Public Safety Communication issues
Multiple security failures contributed to Uvalde school mass shooting fatalities
This Radio Hacker Could Hijack Citywide Emergency Sirens to Play Any Sound
Houston Fire Department radio system plagued with problems
RF System Design
Recommend and design the correct system according to customer needs and budget. This includes a needs assessment, RF Propagation mapping, Site recommendations, and product recommendations.
Paging and Radio based HIPAA compliance.
We have saved hospitals and medical providers hundreds of thousands of dollars by providing HIPAA compliance needs assessments as it applies to hospital and medical paging and radio communications. Did you know that hospital paging and radio communications can be intercepted with free software, a laptop, and a $39.00 USB Software Receiver? Contact us to find out more information.
HIPAA Law Myths and Facts https://brics.butlersheriff.org/help/radio/hospital-communications/hipaa/
Our clients








