Nigeria Best Car Tracking and General Security Company


Counter Intelligence Surveillance Measures (CISM)  is a service provided to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility, State, or Country. A Counter Measure Surveillance survey will provide a professional evaluation of the facility’s, State, or Country technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed entity.

Our specialist Surveillance carefully perform:

  • Physical search for hidden transmitters, microphones, and cameras.
  • Radio frequency spectrum analysis;
  • Non-Linear Junction Evaluation;
  • Thermal Emissions Analysis;
  • Telephone and network analysis;
  • VoIP system analysis;
  • Electronic inspection for covert video setups;
  • Carrier current analysis of AC outlets and cabling throughout the premises.
  • .

We delivers advanced counter surveillance and intelligence solutions  with  real time scanning and reporting.

Our Burst transmitters are covert recording devices that operate 24 hours a day, 7 days a week, and only transmit at a predetermined time for a set burst limit which could be set between 15 to 30 seconds or more. These transmissions are commonly set for the early hours of the morning over a weekend in an effort to avoid detection.

What this means is your attacker can now transmit much longer ultra high-quality audio and video recordings almost instantly. This makes the transmissions even harder to detect by the inexperienced or under equipped, as the data is transmitted far more quickly at a frequency they are incapable of detecting.

What makes these devices so attractive to the criminal element is the fact that the quantity of data able to be transmitted far surpasses the now superseded covert devices. A burst transmitter operating at 90 GHz has the potential to transmit up to 10 Gigabytes of data per second. When you consider the average DVD contains 8GB’s of high-quality audio and video footage, the threat to your business can be catastrophic

Core Features

Sweeps and Office Debugging

Our specialist inspectors conduct an initial risk audit and assign a threat level for each client. We conduct the industries most comprehensive Counter Surveillance Measure investigation. Vulnerabilities are eliminated, covert devices detected, frequency spectrum’s monitored, and communications are secured

Network Telephone and Communications Analysis

Electronic bugs, listening devices, hidden cameras, Bluetooth bugs, infra-red beams, burst/packet bugs, spread spectrum and other similar eavesdropping devices are widely obtainable over the Internet and in many cases.

Mobile Phone Malware and Spyware Analysis

Using law enforcement spec digital forensic equipment, our legally qualified forensic examiners can detect malware, spyware and rogue cellular tower interception attempts. These threats allow attackers to listen, track, and monitor all voice communications and stored data on your device.

Other Core Counter Intelligence Equipments

Prediator Drone

Drone Rifle

Lightining RCIED Jammer

RF Jammer

Get in Touch

Find out how we can help you manage your fleet more effectively.