In ScanTek TSCM we care and protect your privacy, your information and your critical systems.
Our training is universitary, (Naval Radioelectronic Engineering, B.Sc), widened with postgraduate degrees in design and implementation of networks (Cisco Systems) and supplemented with specific training in mobile cybersecurity (INCIBE), which allow us to have a global view of almost any threat.
We have more than eleven years of experience in telecommunications multinational corporations, as part of technical projects (implementation, deployment and operation) of nationwide security and safety networks. We also have experienced staff coming from the intelligence community.
Our TSCM Audits are not only focused exclusively on locating and removing all kinds of technically-sourced attack vectors, but we also examine site location, structure and business operations prior to the TSCM works, in order to obtain a global view of the problems and apply appropriate solutions.
We have specific and specialized technical equipment for TSCM audits, but we also make extensive use of professional range, lab-grade equipment, that allows us to detect, isolate, report, and characterize all types of signals in nearly any way capable of transporting information.
In addition to our technical training, we also have professional qualifications as Security Managers and Private Investigators. We carry out, if required by our clients, a meticulous assessment of security risks - technical, human and organizational - that are usually associated with static or "in motion" scenarios.
Our vision is not only active, locating technical attack vectors, but we also act pre-emptively and reactively, creating safe spaces and rooms protected from surreptitious audio recordings and hostile transmission of radio frequency signals that could seriously compromise your corporate interests and privacy.
By using professional and lab grade, realtime spectrum analyzers, we can capture and analyze even the most weak and short radio signal. No matter what kind of technology is being used to modulate: frequency hopping, bursting signals, etc. Contact Us
With infrared spectrum analysis we can detect and find thermal fingerprint of hidden devices when they are powered and in service. Contact Us
Using this kind of devices called "non linear junction detectors" is possible for us to find hidden electronic devices containing semiconductors (even in they are not working or not powered), when they hidden inside a wall or any kind of furniture.. Contact Us
Network cables and telephone lines are the most useful vector to transmit and exfiltrate information. We use lab-grade equipment to detect, locate and characterize all kind of hostile signals in almost all kind of cables no matter if they are powered or in service. Contact Us
The most important part of a TSCM inspection. Where is not a 100% technical threat, a physical inspection conducted by skilled team comes essential to find and eliminate what is technically impossible to locate by electronic means. Contact Us
"Our training and equipment makes the difference. But, avobe all, our dedication and discretion."
Camino de Ronda, St.
Tel: (+34) 644 400 030
Threema ID: PJRN8TTM