Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER & INTELLIGENCE
Home / CYBER & INTELLIGENCE
/
Smartphone and Tablet electronic countermeasures
Electronic surveillance countermeasures – TSCM

Scope of the service:

The Electronic Countermeasure, defined by the US Federal Government as TSCM (Technical Surveillance Counter-Measures), includes a series of activities designed to detect, in a given environment, any type of device capable of fraudently capturing information (audio, video and data).

An electronic surveillance countermeasure operation must be carried out by highly specialised personnel with a high level of training in the field of radio-frequency and radio-transmission.

365TRUST is able to analyse the network traffic of any Smartphone and Tablet and to understand if there is a Trojan-Software Spy in them.

  • The Smartphone or Tablet to be analysed is not even “touched” by the operator
  • The device uses the technology Sniffing – “Man in the Middle”
  • It is sufficient that the owner of the smartphone to be analysed connects to the local Wi-Fi network generated directly by the device and follows the operator’s instructions
  • A report will automatically be generated (pdf file in italian) + a capture.pcap file for forensic use
  • Any device with any operating system can be analysed
  • Extremely fast analysis (approx. 10 min.)
  • No connection to external servers
  • Updates always available
  • Very simple and fully automated use

Analysis Report:

At the end of the scanning activity, a report is generated in pdf format containing the following information:

  • the mobile phone data analysed
  • the report generated
  • the duration of the acquisition
  • the number of packets
  • the SHA1 of acquisition
  • the descriptions given by the compromise indicators
  • the location of communications and all intercepted transmissions:
    • the protocol
    • the domain (if available)
    • IP address
    • the destination port number

With this device, 365TRUST identifies a Trojan Software Spy by analysing the network traffic of any mobile phone or Tablet

Recommended to you

CISO as a Service SOC as a Service Smishing simulation & awareness Phishing simulation & awareness Cyber Threat Intelligence (CTI) Domain Threat Intelligence (DTI) Penetration Testing (PT) Vulnerability Assessment (VA) Smartphone and Tablet electronic countermeasures Electronic surveillance countermeasures – TSCM