sys.status: SECURE _

BLACK SIGNAL

TECHNICAL SECURITY & COUNTER-SURVEILLANCE

We provide technical security for those who value confidentiality. Professional threat detection, device analysis and information protection.

What we do

A comprehensive approach to technical security — from premises inspection to digital privacy protection.

Premises Inspection
// 001

Premises Inspection

Technical inspection of offices, apartments and houses for covert surveillance devices. RF analysis, physical inspection, thermal imaging.

Learn more →
Vehicle Inspection
// 002

Vehicle Inspection

A €10 tracker can be installed on any vehicle in 30 seconds at a parking lot. It will transmit your location for 6 months. We find and eliminate such threats.

Learn more →
Device Analysis
// 003

Device Analysis

Checking phones, laptops and other devices for software and hardware surveillance. Network traffic analysis and installed software inspection.

Learn more →
Privacy & OPSEC
// 004

Privacy & OPSEC

Setting up secure communication channels, reducing digital footprint, operational security for travel and everyday life.

Learn more →
OSINT
// 005

OSINT & Private Intelligence

Three levels of open source intelligence — from basic checks to full intelligence profiles. Digital footprint analysis and cleanup.

Learn more →
Findings Analysis
// 006

Findings Analysis

Forensic analysis of discovered devices and software. Detailed report with recommendations for threat elimination and further protection.

Learn more →

Why it matters

Rented premises

When renting a new office or apartment, you don't know what the previous tenant left behind. But the threat isn't only from them — employees, competitors, landlords or even law enforcement could have installed surveillance devices. They can be embedded in furniture, outlets, smoke detectors — any interior element. A few minutes of access to the premises is enough.

Vehicle

A coin-sized GPS tracker can be covertly attached to a vehicle in seconds. It can operate autonomously for up to 6 months, transmitting route and stop data in real time. Additionally, factory GPS modules, alarm systems with tracking, dashcams with Wi-Fi — all of this can be compromised. Small trackers are easily hidden behind license plates, in wheel wells or under trim panels.

Devices

Your phone is the primary source of information about you. Malware can activate the microphone and camera, read messages and track location without any visible signs. Moreover, smartphones constantly transmit telemetry data — geolocation, app usage, browser history, health data. All of this can be used to compile a detailed dossier on a person.

How it works

01

Contact

Reach out via a secure messenger. We discuss details only through encrypted communication channels.

02

Preliminary call

After initial contact, we arrange a secure call to discuss details and assess the situation.

03

Assessment & execution

On-site visit for assessment or direct execution of work using specialized equipment.

04

Report

Detailed report with inspection results, findings analysis and recommendations for further protection.

Our clients

Business owners

Protection of confidential negotiations and trade secrets

Lawyers & attorneys

Protecting attorney-client privilege and client confidentiality

Journalists & activists

Source protection and defense against persecution

Public figures

Private life protection from unauthorized surveillance

Anyone who values privacy

Control over your own information security

Ready for an inspection?

Your first contact — via a secure messenger. We don't process website inquiries to ensure maximum confidentiality.

Signal Session WhatsApp