Device Analysis
Home/ Services/ Device Analysis

Device Analysis

Inspection of mobile phones, laptops and other personal devices for software and hardware surveillance. Network traffic analysis and installed software inspection.

Contact us →

Your phone knows everything

A modern smartphone is a microphone, camera, GPS tracker and message archive all in one device. Malware can gain access to all these functions without any visible signs to the owner.

Additionally, smartphones constantly transmit telemetry data — geolocation, app usage, browser history, health data, contacts, calendar, photos and file metadata. All of this enables building a comprehensive dossier on a person — their habits, contacts, routes, interests and vulnerabilities.

Commercial surveillance software is available for purchase and can be installed in minutes with physical access to the device. It can intercept calls, messages, passwords and even remotely activate the camera and microphone.

Laptops and computers are also subject to compromise — through malware, hardware implants or component substitution during servicing.

Analysis areas

Software

Searching for malicious apps, hidden processes and unauthorized surveillance software.

Network traffic

Analysis of outgoing connections to detect suspicious data transmissions to external servers.

Hardware inspection

Examination of internal components for unauthorized modifications and implants.

Profiles & permissions

Checking installed configuration profiles, app permissions and system settings.

Communications analysis

Checking messengers, email clients and other communication channels for compromise.

Recommendations

Individual recommendations for device security setup and protection against repeat threats.

How to prepare devices

Do not update or factory reset the device before inspection — this may destroy surveillance traces.

Charge the device to 100%. Have the PIN/unlock password ready.

Do not delete suspicious apps yourself. Keep the device in its current state.

If you have reason to believe the device is compromised — do not use it to contact us.

Detailed Scope of Work

Click a platform for details on the analysis performed.

Jailbreak and unauthorized modification check
Installed MDM profiles and configuration profiles analysis
App permissions audit (camera, microphone, location)
Network traffic analysis for suspicious connections
Outgoing data communication analysis
Paired devices and active sessions review
iCloud and backup configuration check
Certificate and VPN configuration verification
Root access and bootloader status verification
Scan for known spyware signatures
Hidden and system app analysis
App permissions and accessibility services audit
Device administrator and MDM profile check
Network traffic analysis for suspicious connections
Side-loaded app installation sources check
Background process and autostart analysis
Google account and Cloud sync settings review
Startup items, launch agents and daemons analysis
Browser extension and plugin audit
Network connections and open ports check
SIP and system integrity verification
Accessibility and input monitoring permissions review
Installed certificate and profile analysis
Remote access configuration check (SSH, VNC, ARD)
User account and privilege escalation audit
Autorun, scheduled tasks and services analysis
Running processes and loaded modules check
Registry analysis for persistence mechanisms
Network connections and firewall rules audit
Installed drivers and kernel module verification
Remote access tools check (RDP, TeamViewer, AnyDesk)
User accounts, groups and Group Policy analysis
Telemetry settings and data collection audit

RESULT

Detailed technical report per device
List of identified threats with severity classification
Step-by-step recommendations for threat elimination
Device security hardening guide

Analysis cost

Phone €200
Laptop (Mac / Win) €200
Phone + laptop €350
Additional (same session) €150

* Software and hardware analysis

Order analysis →

Need an analysis?

Contact us via a secure channel to discuss details.

Contact us → Privacy & OPSEC →