Electronic (Bug) Sweeping

Experts in Technical Surveillance Countermeasures Protecting against information theft

Digital Investigations

Evidentially sound data retrieval from a wide-vareity of mobile devices

Network Security Audit

Providing Network Configuration and Vulnerability Assessment

Internet Investigations

Open Source Intelligence (OSINT) and Social Media Investigation

Our Services

Bug Sweeping

Business counter espionage debugging sweeps,  Electronic counter eavesdropping, local technical inspections carried out by experienced (30+ years) highly trained professionals using the very latest technical surveillance countermeasures (TSCM) equipment to detect, defeat & nullify surreptitious listening devices, concealed cameras and other privacy invasion risks identify areas of current or potential future compromise, we protect businesses from economic espionage and the theft of business secrets and intellectual property we have been making it safe to talk in Asia since 1992.

Digital Investigations

Digital forensic investigations for computers, tablets, and mobile phone devices Under forensically sound conditions & with full access to the device we can collect digital data preserving it in a reliable & forensically verifiable manner. Recovering all user generated data including deleted data such as   instant messages, call logs, applications data, images & video, geolocation data, transferred or stored files, contact numbers & call times. We have previously provided expert witness reporting and oral evidence to the courts of Hong Kong and Singapore.

Network Security Audit

Cyber-TSCM – An onsite network security audit and risk review. A detailed assessment of your network infrastructure and its vulnerabilities. The risk assessment objective is to scan, examine, scrutinise & report on the level of risk associated with any security vulnerability discovered. Often these exposures are never patched by in-house or out-sourced IT. Most boards or managing directors take it on blind faith that systems are up to date; and it only comes to light that they are not after a successful ransomware attack or other cyber breach.

Internet Investigations

Utilising our deep understanding in online investigative and digital surveillance skills obtained through years of experience working with global management consultancies, our internet investigations services enables clients to receive openly sourced reports on individuals / organisations to help maintain corporate reputational risk, competitor or acquisition target investigation intelligence or to confirm qualifications and work experience of perspective senior level employees (Enhanced vetting process) get answers to questions legally and ethically via open source intelligence.

WHY CHOOSE US?

YOUR PROTECTION COMES FIRST

CERTIFIED AND TRAINED TEAM

REALISTIC AND RESPONSIVE PRICING

OVER 30 YEARS OF TRUSTED SERVICE

WE ONLY PARTNER WITH THE BEST

 

WHAT OUR CLIENTS SAY

When you said it would take 8 hours I thought you were joking. I now know what a real TSCM inspection involves. 

Anonymous

I really did not think you would find anything. Thank you so much. 

Hedge Fund

Managing Director

Thanks for saving my business; my sanity and probably my marriage!

Trading Company

Owner

I now realise that the last TSCM inspection we had done was a “Rain Dance’. Thank you for your integirty. 

Anonymous

For more details please give us a call:

+852 91031852

RISK3 Consulting Detect – Defeat – Nullify

 

RISK3’s cutting edge countermeasures technology coupled with our diligent strategies and appropriately certified countermeasures practitioners guarantees our clients are afforded with a preeminent Technical Surveillance Counter Measures (TSCM) and eavesdropping detection service. We “Detect Defeat and Nullify”™ electronic eavesdropping devices and other forms of technical compromise and furnish practical recommendations to ensure your privacy is safeguarded.