Endoacustica offers, Exclusive Customer Service and free Training

Security & Digital Investigation Services

Integrated protection for places, people and information: TSCM (bug sweep), video surveillance, penetration testing and digital forensics. We design, install and validate against professional standards.

TSCM Video Surveillance Offensive Security Digital Forensics

Video Surveillance

HD CCTV/IPC systems with secure remote management (smartphone/PC). Design to code, installation and maintenance on new or existing setups.

  • Access control for sensitive areas with event recording.
  • Continuous monitoring with time‑and‑place traceability.
  • Maintenance, updates and privacy/GDPR adjustments.
Professional video surveillance systems

Bug Sweep (TSCM)

Technical and instrumental inspections to find RF, wired or hidden surveillance devices. Formal technical report provided.

  • RF analysis up to 14 GHz (spectrum, GSM/2G/3G/4G/5G burst).
  • Wi‑Fi/Bluetooth, LJD “wand”, endoscopy and thermography.
  • Power/data line inspections and conducted‑wave threats; on‑site removal of findings.
Technical Surveillance Counter‑Measures (TSCM) bug sweep

Penetration Testing

Controlled attack simulations across Web/Mobile/API, network and Wi‑Fi to surface exploitable weaknesses. Evidence‑based reporting with CVSS severity and a prioritized remediation plan.

  • OWASP · PTES/OSSTMM methodologies.
  • Planned test windows to avoid disruption.
  • Re‑test to verify implemented fixes.
Penetration testing and offensive security

Mobile Data Extraction

Cellebrite UFED and dedicated tooling to recover SMS/chats, media, geodata, histories and deleted content — with full chain of custody.

  • Logical, physical, chip‑off and backup extraction (where available).
  • Forensic image, event timeline and technical report.
  • Expert support for litigation and internal investigations.
Forensic mobile data extraction with Cellebrite UFED

Frequently asked questions

What does a TSCM bug sweep include?
RF testing up to 14 GHz, Wi‑Fi/Bluetooth analysis, physical inspections (endoscopy/thermography/LJD) and checks on power/data lines. A formal technical report is delivered. Learn more on the TSCM page.
How long does a TSCM engagement take and what do you need for a quote?
It depends on size, layout and risk: typically half a day for small offices and a full day for mid‑size sites. For a quote we need the address, a rough floor plan and availability windows.
Will a penetration test impact production?
We schedule testing windows and rate‑limit traffic to avoid disruption. Potentially intrusive steps run during low‑impact hours. Details on the Penetration Testing page.
What deliverables will we receive?
A technical report with reproducible evidence, CVSS severity, and (where relevant) an event timeline, plus a prioritized remediation plan. TSCM/Forensics include attestations and hash/chain‑of‑custody.
Do you recover data from locked or damaged devices?
We assess model/OS and device state; we attempt logical/physical, chip‑off and backup‑based extractions where feasible. Outcome depends on encryption, overwrites and hardware condition. See Mobile Data Extraction.
Do you operate lawfully and with privacy safeguards?
Yes. Work proceeds only under valid title/mandate, NDA and authorized scope, following best practice (GDPR, chain of custody, rules of engagement) with documentation for internal/external audits.

Have a project or a concern? Talk to us

A 15‑minute call to define scope and give you the fastest, safest path forward.

Go to contact page