Home Page
Surveillance and Tracking
Predictive Incident Evaluation
Intelligence and Data Page
Electronic Countermeasures
Security Need Evaluation and Knowledge
Request for Data
Links



 


 

Electronic Counter Measures


Most organizations are unaware of the impact illicit surveillance has on their success and corporate mission.

COUNTER SURVEILLANCE


The ECM group utilizes the most up-to-date detection technology. This technology detects audio and video interception devices that threaten your security. It is the same technology used by federal law enforcement and intelligence gathering agencies such as the CIA, NSA, and the State Department.

KNOWLEDGE IS PROTECTION


The ECM group understands the importance of detecting any eavesdropping equipment, and just as significantly, providing protection against future threats.

The ECM group advocates a two-phase policy.

A primary phase utilizing electronic detection technology ensures there are no existing threats. A secondary phase implements state-of-the-art data encryption technology to prevent future interception of your sensitive information.

Information Systems Security (ISS): The security discipline of the ECM group is the concern with the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit and against the denial of service to authorized users, including those measures necessary to detect, document and counter such threats. This consists of protection and maintenance of the information's confidentiality, integrity, availability and accountability.

 

 

 

 

 


  2004-2012
  US Intelligence Agency.
  All Rights Reserved
  Web Design by Gecko Media