Protect facilities, communication devices, and network traffic from malicious eavesdropping

Keeping data and communications private has never been more important. Once acquired, sensitive and proprietary information can go viral before an organization is even aware of a breach. The only way to protect your business is to keep private information private.

In this high-pressure environment, many leading businesses choose HPI to identify and prevent vulnerabilities, averting damaging attacks.

Get Started

Espionage can occur at any time and may be in progress now. Take the first step to lock down sensitive information.

Technical Surveillance Countermeasures (Bug Sweeps)

A search for electronic eavesdropping devices is commonly known as a TSCM Sweep. HPI expands the definition to conduct a thorough and comprehensive sweep of devices, techniques, and locations that must be assessed to ensure security.

HPI sweeps utilize TSCM equipment on par with those used by the FBI, CIA, And Department of Defense including spectrum analyzers, laser light sources, cabling trackers, and wire trackers used inside devices to location and disable threats.

Comprehensive Sweeps for Bugs & Listening Devices

Left undetected, these small, silent, and often invisible surveillance techniques can have severe consequences for your business. TSCM services from HPI can stop intruders in their tracks.

Listening Devices

Hidden and covert audio and video devices can be impossible to find without professional equipment and expertise.

Telephone Systems

Wiretaps are a traditional method of espionage. New implementations are fax machines and teleconferencing devices.

Computers & Software

Computers offer intruders built-in cameras and microphones plus keystroke logging and data theft vulnerabilities.

Office Equipment

Copiers, printers, and other non-communication office equipment are capable of saving or transmitting data.

Cell Phones & Portable Devices

Phones and tablets are particularly dangerous, as they follow their owners everywhere. Detecting and removing spyware and malware requires expert assistance.

Vehicles & GPS Trackers

Newer cars may be susceptible to hacks with Bluetooth and other technology as well as installed GPS units.

Offices & Facilities

The construction of your office or an off-site facility could have acoustical leakage, optical loopholes and other non-technical vulnerabilities.

Residences

Many homes have security systems and other owner-installed functions that, in the wrong hands, can be used against you.

Rely on the Experts

HPI_Team_Keener_Headshot1

Timothy J. Keener

DIRECTOR, GLOBAL TSCM & PHYSICAL SECURITY

After a remarkable 20-year career with the U.S. Secret Service, Tim develops comprehensive strategies for security assessment, planning and implementing technically secure environments.

HPI_Team_Todd_Circle_Web

Todd D. Kelly

DEVICE FORENSICS & SURVEILLANCE DETECTION

Todd possesses industry-leading forensic training, arming him with the tools, knowledge, and practices to secure privacy from threats both internal and external.

HPI_Team_Randy_Circle_Web

Randy Z. Morrell

TELECOMMUNICATIONS SPECIALIST

With 30 years of experience, Randy performs both physical and technical sweeps, relying on his knowledge of telecommunications systems and their installation, design and programming.

gappi_logo
HPI_Web_Images_ERII
fali_thumb