Services

RISK3 Consulting Limited

RISK3 Consulting Limited has been “Protecting the Spoken Word in Asia™ since 1992.” We combine proven technical disciplines and years of operational knowledge and real world experience into a coherent approach; providing our clients with world-class professional services always exceeding their expectations, whilst remaining practical and maintaining competitive cost.

LOCAL TECHNICAL INSPECTION

(‘BUG SWEEPS’)

We ensure that your privacy and information are not being compromised by electronic eavesdropping devices or other threats, through the delivery of Local Technical Inspections – also known as ‘Bug sweeps’. These can be provided as a one-off or more commonly as an ongoing recurrent service using cutting-edge technical surveillance countermeasures equipment.

ELECTRONIC

COUNTERMEASURES

Once we have secured your offices. We can recommend, procure, install and maintain systems and other countermeasures equipment to protect your environment 24/7 against covert eavesdropping threats. Our systems are designed to detect eavesdropping vulnerabilities to ensure that your information remains secure.

IN-PLACE MONITORING

MEETING SHIELD

This type of Inspection takes place in conjunction with a meeting or other corporate event. Meeting Shield is a proactive and real time approach to the detection of eavesdropping devices during a meeting. A full TSCM inspection is performed prior to the start of the event in both the meeting location and surrounding areas. During the meeting the area is monitored for any surreptitious transmissions. Client is alerted if a positive detection is identified.

TECHNICAL

VULNERABILITY ASSESSMENT

To examine and confirm you have appropriate safeguards including policies and procedures in place to inhibit intelligence leakage, we can carry out an evaluation of your workplace to identify technical, physical and procedural vulnerabilities, and provide you with practical advice on the implementation of diligent and robust countermeasures.

TECHNICAL SECURITY

CONSTRUCTION COUNTERMEASURES

You will want to safeguard that your new office build-out is not compromised during its construction. We can provide you with advice and monitor the process throughout the refurbishment of your secure environment to prevent the deep installation and deployment of technical eavesdropping devices which would compromise the security of your information once you occupy the office space.

TECHNICAL SURVEILLANCE

COUNTERMEASURES TRAINING

For the hands-on detection of eavesdropping devices, we conduct training on best practice procedures and specialist detection skills. Our courses are designed using the knowledge we have compiled over many years of conducting eavesdropping detection inspections. We stimulate and engage the attendees in a wide range of simulated technical attack scenarios.

About Us

RISK3’s cutting edge countermeasures technology coupled with our diligent strategies and appropriately certified countermeasures practitioners guarantees our clients are afforded with a preeminent Technical Surveillance Counter Measures (TSCM) and eavesdropping detection service. We “Detect Defeat and Nullify”™ electronic eavesdropping devices and other forms of technical compromise and furnish practical recommendations to ensure your privacy is safeguarded.

“We have been protecting the spoken word in Asia since 1992”™

Eavesdropping Detection Services “Bug Sweeping”

Technical Surveillance Counter Measures (TSCM)
Local Technical Inspections (LTI)

It’s our core service, It’s not an add-on or low end service as offered by most guarding, security or management consulting companies. We are a small, but dedicated team of TSCM practitioners with over sixty years of applied knowledge and experience.

RISK3 practitioners are prominent doyens within the TSCM eavesdropping detection arena. We are proud of the service level and ethics we bring to each and every assignment, both small and large. We have worked with some of the biggest corporations in Asia, on some of the Asia’s most sensitive projects involving; Banks, Hedge Funds, Private Equity & Venture Capital Firms, Law Firms, Multinationals, Conglomerates, pharmaceutical, Oil and Gas to name but a few; confidentiality agreements prevent us from particularising further.

The RISK3 team is called upon to advise and operate at the very highest levels.

Whatever the level of threat you or your organisation faces

RISK3 can assure you;

Your privacy can be protected.

Our initial consultation in these matters is always free of charge.

Call or email us to confirm a consultation.

TEL : +(852) 9103 1852     EMAIL : info@risk3.com

Mobile Forensics

MOBILE DEVICE FORENSICS

The most advanced mobile device forensics for the most demanding situations. Evidentially sound data extraction from mobile phones, iPhones, Blackberry, Android and other Mobile devices.

Mobile device forensics is best known for its application to law enforcement investigations, but it is also useful for corporate investigations, electronic discovery (eDiscovery) and litigation support.

Mobile Device Forensics includes the examination of mobile phone handsets and all attached media, such as SIM cards (subscriber Identity module) and memory storage cards, normally, a microSD card located inside the device. Mobile device forensics is similar to digital forensics in that a wide variety of data can be retrieved, including call registers, SMS text messages and MMS, multimedia messages. Call us for more information.

SPYWARE

THE NEW CORPORATE “BUG”

We have noticed an upsurge in the number of mobile devices which have been compromised and illicit software, aka spyware installed; this can be devastating to not only the business but also ones personnel life. A simply way to prevent spyware being placed on the phone is to maintain control of the device at all times. If you believe you device maybe compromised then the simplest, quickest and cost effective approach is to replace the device.

If you absolutely need to know if your device has been compromised we can isolate the device and conduct a mobile forensic investigation to either confirm or refute your suspicions, depending on the type of spyware in place it may be possible to identify to whom the device is reporting to.

DIGITAL FORENSICS

AUDIT AND INVESTIGATIONS

We offer a complete end-to-end service. From on-site analysis, seizure and forensic collection of exhibits, to processing within our secure-storage imaging laboratory, timely and cost-effective analysis by our dedicated specialists, and production of forensic reports. Our laboratories are equipped with industry-standard tools to examine a whole range of computers and mobile devices likely to be submitted for examination – from the latest smartphones to the largest hard drives. Our central location means we are well placed to deal with urgent cases in the CBD and surrounding areas.

For more details please give as a call for a free consultation.