Answers to common questions about our services, work process and confidentiality.
General
TSCM (Technical Surveillance Countermeasures) is a set of measures for detecting and neutralizing covert surveillance devices. This includes inspecting premises, vehicles and personal devices for hidden transmitters, cameras, trackers and malicious software. It's essential for protecting confidential negotiations, business information and personal privacy.
This depends on your threat level and the nature of your activities. For businesses dealing with confidential information, scheduled inspections every 3-6 months are recommended. Mandatory inspection is recommended when changing offices, after renovation work, before particularly important negotiations or if information leaks are suspected.
Duration depends on the type and scale of inspection. A vehicle — 1 to 2 hours. An apartment or small office — 2 to 4 hours. A large office or house — may take a full day. Device analysis — depends on the number and complexity. Exact timing is discussed individually.
We work with a wide range of threats: RF transmitters, miniature cameras, GPS/GLONASS trackers, network anomalies, malicious software, hardware device modifications, unauthorized connections to communication lines and other information collection devices.
Confidentiality & process
Confidentiality is the foundation of our work. We don't store client data longer than necessary to complete the work. Communication is conducted exclusively through secure channels (Signal, Session, WhatsApp). We don't maintain public client databases and don't disclose the fact of cooperation to third parties.
Initial contact — through a secure messenger: Signal, Session or WhatsApp. Send a message with a general description of your request. After that, we'll arrange a secure call to discuss details. Then — a meeting for assessment or work execution. We don't process requests from open website forms.
The main rule — don't inform third parties about the planned inspection. For premises: ensure access to all rooms, technical areas and utilities. For a vehicle: bring it to the agreed location with the keys. For devices: don't update or reset devices, charge them to 100%, prepare passwords. We provide detailed instructions after initial contact.
Yes. We work with both private individuals and businesses. For corporate clients, we offer regular scheduled inspections, meeting support and staff training on information security. Terms are discussed individually.
Geography & pricing
We operate in Ukraine and can travel abroad. Geography and logistics are discussed individually for each request.
Cost depends on the type of inspection, premises size, number of devices and other factors. Approximate pricing is available on the contact page. Exact cost is determined after discussing the details of your request through a secure communication channel.
Finding nothing is also a result that confirms the current security status of your facility. You receive a report on the conducted inspection confirming the absence of detected threats at the time of inspection, and recommendations for maintaining the security level.
OSINT & intelligence
Yes. OSINT (Open Source Intelligence) is based exclusively on analysis of open sources — public registries, social media, data breach databases, archives. All work is conducted within applicable laws without unauthorized access to private systems or databases. This is standard practice used by both government agencies and the private sector.
Yes, and we recommend it. A self-check reveals what information about you is available from open sources, lets you assess your vulnerability and receive protection recommendations. It's the first step towards informed digital footprint management.
Practical questions
Premises and vehicle inspections require physical presence — this cannot be done remotely. For device analysis, some checks can be performed remotely (network traffic analysis, software checks), but a full analysis requires physical access. OSINT intelligence is performed entirely remotely.