Scope of the service:
The Electronic Countermeasure, defined by the US Federal Government as TSCM (Technical Surveillance Counter-Measures), includes a series of activities designed to detect, in a given environment, any type of device capable of fraudently capturing information (audio, video and data).
An electronic surveillance countermeasure operation must be carried out by highly specialised personnel with a high level of training in the field of radio-frequency and radio-transmission.
365TRUST is able to analyse the network traffic of any Smartphone and Tablet and to understand if there is a Trojan-Software Spy in them.
- The Smartphone or Tablet to be analysed is not even “touched” by the operator
- The device uses the technology Sniffing – “Man in the Middle”
- It is sufficient that the owner of the smartphone to be analysed connects to the local Wi-Fi network generated directly by the device and follows the operator’s instructions
- A report will automatically be generated (pdf file in italian) + a capture.pcap file for forensic use
- Any device with any operating system can be analysed
- Extremely fast analysis (approx. 10 min.)
- No connection to external servers
- Updates always available
- Very simple and fully automated use
Analysis Report:
At the end of the scanning activity, a report is generated in pdf format containing the following information:
- the mobile phone data analysed
- the report generated
- the duration of the acquisition
- the number of packets
- the SHA1 of acquisition
- the descriptions given by the compromise indicators
- the location of communications and all intercepted transmissions:
- the protocol
- the domain (if available)
- IP address
- the destination port number
With this device, 365TRUST identifies a Trojan Software Spy by analysing the network traffic of any mobile phone or Tablet