IDRC
  • Home
  • About US
  • Unfreezing Bank Accounts
  • Financial Services
  • Reason for IDRC Success
  • ASSET LOCATION
  • Legal Requirements
  • Contact Us
  • Due Diligence
  • Crisis Management
  • Physical Security Audits
  • CMS 3178 Compliance
  • Data Security
  • TSCM (Debugging)
  • VIP/Executive Protection
  • Workplace Violence
  • More
    • Home
    • About US
    • Unfreezing Bank Accounts
    • Financial Services
    • Reason for IDRC Success
    • ASSET LOCATION
    • Legal Requirements
    • Contact Us
    • Due Diligence
    • Crisis Management
    • Physical Security Audits
    • CMS 3178 Compliance
    • Data Security
    • TSCM (Debugging)
    • VIP/Executive Protection
    • Workplace Violence
IDRC
  • Home
  • About US
  • Unfreezing Bank Accounts
  • Financial Services
  • Reason for IDRC Success
  • ASSET LOCATION
  • Legal Requirements
  • Contact Us
  • Due Diligence
  • Crisis Management
  • Physical Security Audits
  • CMS 3178 Compliance
  • Data Security
  • TSCM (Debugging)
  • VIP/Executive Protection
  • Workplace Violence

Data and information security TSCM Services

Information Security

 

Information Assurance:  The practice of mitigating information-related risks by protecting the  confidentiality, integrity, and availability of data and systems that  store, process and transact this data. Insider and outsider threats pose  risk to businesses which utilize information technology to conduct  electronic commerce.


Computer Security:  Addresses enforcement of secure behavior on the operation of computers,  including the confidentiality, integrity and availability of electronic  information that is processed by or stored on computer systems. 

In today's world information assurance  and computer security is more important than ever.  The number one form  of "Hacking" today is activating your computers webcam for access video  and audio of your home or office.  IDRC has experienced and trained  analyst that will evaluate your current information system and design a  comprehensive Information Assurance program for your firm. 
 

You can find listening and covert video devices on the net, in magazines  and in most electronic stores.  You also have the risk of someone  emailing you spy software that will give them access to your stored  information as well as your webcam for real time audio and video.  The  threat is more extensive today than at any other time in our history. 
 

Smart Phone Vulnerabilities: Your Smart phone is an extension of  your office and or home computer.  Many Smart Phones are connected to  your computer network by Social media apps such as Facebook, Twitter or  RSS.  High percentages of users do not password protect or install anti  virus and anti malware software on their handhelds.  All apps should be  scanned for viruses and malware before downloading.  Care should be  taken in public areas that users devices and data are not acquired  through the blue Tooth or Wi-Fi connections.  IDRC has the capability to  analyze your device to detect compromise and in some cases determine  who and where the attacks originated as well as protecting you in the  future from attack. 
 

Internet Security: The design of  internet protocols is to quickly allow multiple computers to communicate without interruption.  This design element which allows us to communicate between each other is the vulnerability that hackers exploit to attack your organization.    Being designed before the onslaught of hackers the TCP/IP protocol was  written with little attention being provided to security of the protocol  leaving the system with many security flaws.
 

This security flaw makes it possible for hackers to "Spoof" an IP  address.   Source addresses are not used to route the destination so a  hacker can forge or spoof the IP address making the computer believe  they are the legitimate sender while a remote server is sending data  posing as someone else.
 

IDRC has the ability to address the IMAP an POP issues that are  exploited by hackers as well as the system configuration flaws such as  default configurations not being changed, default or empty root  passwords, and the system manager leaving holes in the system that are a  non secure run mode.
 

Computer Forensics: Forensics provides you with the ability to determine  what data has been utilized on a computer or mobile device, the time  that the data was accessed and what files were changed.  This  information is invaluable in a legal or court situation to prove or  disprove fact of the case.  Our forensic analyst are experienced with  EnCase, FTK Imager, Prefetch Analyzer, Forensic Toolkit (FTK) and others for e-discovery.
 

IDRC provides a  full service Information Security  program to address your Computer,  Smart Phones, Network, IT Forensic and Telecommunications Systems.
 

  

TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM)
 

Download pdf documents on Choosing a TSCM Team and Who would want to Bug you below.
 

 
This  year the FBI reported a 200% increase in the number of industrial  espionage cases that they worked. One FBI report to Congress stated that  American businesses loses are $100 Billion a year to foreign spying. He  reported that FBI investigations revealed that 23 countries actively  engage in economic espionage activities against the United States. Other  sources testified that they knew of 51 countries targeting the United  States to include several of our allies. Additional information  indicates that it is not just the “Super Companies” that are targeted.  Middle  size to small companies are targeted four times more often, and the  main reason is that they are easier to penetrate.  


Private sector  bugging has exploded in the last 5 years with the expansion of the  internet.   Individuals now have access to purchasing listening,  recording and bugging  equipment online that they did not have access to  in the past.  There are hundreds of companies selling devices that have  the ability to monitor your computers, mobile devices homes and  offices.  IDRC has certified technicians and the professional equipment  required to competently provide you with counter measure services. 
 

Activities:

Commercial Technical  Countermeasures conducted will be a radio frequency analysis, telephone  analysis, telephone line analysis, carrier current analysis, and a  physical search. The telephones and lines will be analyzed by performing 27 different test.


Counter measures are performed by  experienced professionals using the industry excepted and certified  counter measure equipment and ATAB, and ISCTP Certified Technicians.


Background

We have been performing counter-measure  sweeps for over 30 years and have successfully completed over 60  government and civilian training schools for over 7,000 hours of  training. Mr. Flannigan was voted Security Professional of 1998 by Counter Terrorism and Security International and has  been featured on 48 hours, Street Stories and 20/20 as well as many  news paper and magazine articles for his counter-measure expertise. 


We have performed successful investigative services for Past Presidents, Fortune 500 companies and law firms. We have performed counter-measures internationally in Berlin, Moscow, Lima, and Hong Kong to name a few. 


Our equipment is state of the art and is the recommended equipment of T.R.A. and ATAB for Counter Measure sweeps. Our  Technicians hold Advanced ATAB and T.R.A certified Counter Measure  Certifications and have a minimum of 6 years experience as counter  measure technicians.

Learn More

If you would like a power point on Information Security or On Smartphone Security contact us. 

Find out more

Copyright © 2021 IDRC - All Rights Reserved.


Powered by GoDaddy Website Builder