Our office is often visited by clients
who believe that the privacy of their home, or their business, or their phone has been violated.
The majority of cases are verified.

Communications Protection Measures for Individuals
Our office is often visited by clients who believe that their home or phone is not safe and their privacy is at risk. Unfortunately, the vast majority of cases prove to be true, as advances in technology have created devices beyond suspicion that can be used for suspicious purposes, and which, due to their extremely small size, are difficult to be noticed by a non-expert. Also, the rapid proliferation of smartphones has greatly facilitated “information leakage”, as it requires the installation of a simple application to make your phone “vulnerable” to third parties.
Especially in the case of your mobile phone, there are some signs, which if verified, are indications of improper operation. Copies of your e-mails stored and forwarded without any action on your part, interference during your conversations, receiving and sending SMS notifications without any action on your part are just some of them.
There are many reasons why someone might be interested in your life. You may own a large fortune, be a celebrity and your life may be of interest to many people, or a prestigious person with considerable power in their hands. On the other hand, you may have been the victim of surveillance by an ex-spouse or partner you have recently separated from, a neighbour with whom you have had a dispute, or an opposing party from whom you have significant claims.
If you believe your privacy is being invaded, try to remain calm and maintain your usual routine. Contact us from a neutral location and device and do not share your suspicions with anyone.
We are available 24 hours a day and carry out comprehensive scans in a way that is not visible to the perpetrators. We use the most sophisticated equipment and have a high level of expertise. Our many years of experience in similar cases is a guarantee for reliable results. After we have completed our scanning work, we will present you with our findings, as well as the evidence that will allow you to substantiate your case, and possibly bring the perpetrators to justice.

Communications Protection Measures for Business
Communications protection measures relate to actions to prevent, detect and counter any form of unintended surveillance. Its purpose is to protect your privacy and that of your business, or if it is already too late, to identify the means used and neutralise them.
In our office we offer specialized techniques of communication protection and control that meet the official TSCM (technical surveillance counter-measures) standards. Our clients include Public Organizations and companies throughout the Greek territory.
We use only state-of-the-art equipment and are able to detect any kind of surveillance technique such as:
– Interventions via radio frequencies
– Interventions via GSM
– Hidden camera installations
– Hidden microphone installations
– Interventions on your telephone line
– Spyware on mobile phones
– Infrared transmitter installations
We are also able to examine your company or organization’s facilities and identify any security gaps, as well as analyze its policies and procedures to discover any vulnerabilities.
A complete scan takes at least 2 hours, at the end of which we will be able to:
– to present you with the results of our research
– identify the vulnerabilities of your physical facility and your corporate policies and procedures
– suggest ways and techniques to improve the security level of your business
If you believe your business privacy is at risk, contact us from a secure device and location and ask us to perform a scan at your premises. We are available 24 hours a day and move with discretion and professionalism so as not to disrupt your working environment, and to avoid being noticed by people within your business who may have placed “suspicious” devices.
And because prevention is always the best way to deal with the problem, ask us to carry out a study of your business premises and processes to find out which areas are exposed and could be targeted by someone who wants to breach your privacy.