Inspection of mobile phones, laptops and other personal devices for software and hardware surveillance. Network traffic analysis and installed software inspection.
Contact us →A modern smartphone is a microphone, camera, GPS tracker and message archive all in one device. Malware can gain access to all these functions without any visible signs to the owner.
Additionally, smartphones constantly transmit telemetry data — geolocation, app usage, browser history, health data, contacts, calendar, photos and file metadata. All of this enables building a comprehensive dossier on a person — their habits, contacts, routes, interests and vulnerabilities.
Commercial surveillance software is available for purchase and can be installed in minutes with physical access to the device. It can intercept calls, messages, passwords and even remotely activate the camera and microphone.
Laptops and computers are also subject to compromise — through malware, hardware implants or component substitution during servicing.
Searching for malicious apps, hidden processes and unauthorized surveillance software.
Analysis of outgoing connections to detect suspicious data transmissions to external servers.
Examination of internal components for unauthorized modifications and implants.
Checking installed configuration profiles, app permissions and system settings.
Checking messengers, email clients and other communication channels for compromise.
Individual recommendations for device security setup and protection against repeat threats.
Do not update or factory reset the device before inspection — this may destroy surveillance traces.
Charge the device to 100%. Have the PIN/unlock password ready.
Do not delete suspicious apps yourself. Keep the device in its current state.
If you have reason to believe the device is compromised — do not use it to contact us.
Click a platform for details on the analysis performed.
* Software and hardware analysis
Contact us via a secure channel to discuss details.