You are here:   Home Debugging

Debugging Overview

The personnel of Advanced Corporate Solutions (ACS) are experienced practitioners in the field of Electronic Countermeasures Investigation (ECMI) “Debugging” and carry out searches for a broad based clientele worldwide. In addition, we use our expertise to educate others to carry out highly skilled countermeasure searches in every environment. All members of the Inspection Team are suitably qualified technicians having been thoroughly Vetted from a Security Perspective and who are well trained in the utilisation of the equipment concerned. 

image

ECMI Programme (Electronic Counter Measures Investigation) "De-bugging"

ACS provides an all-encompassing and thorough Electronic Counter-Measures Investigation (ECMI) “Debugging” that utilises the most advanced modern equipment and technology available in South Africa. Due to the advancement of Global Corporate Competitiveness, there is a growing need amongst Corporate Institutions, especially at Executive Staff levels, to protect all forms of Communication. It is of interest to note that more than 90% of the top listed Corporates in South Africa conduct a REGULAR programme of Electronic Countermeasures Investigation (ECMI) “Debugging”. The reason therefore is that Industrial espionage involves activities such as theft of trade secrets, bribery, blackmail, and technological surveillance.

As well as spying on Commercial Organisations, Governments can also be targets of commercial espionage - for example, to determine the terms of a tender for a government contract so that another tenderer can underbid. Industrial espionage is most commonly associated with technology-heavy industries, particularly in the computer and financial sectors.

 

Espionage takes place in many forms.

All investigations are concluded with a thorough report to the client, which will indicate:

  • Findings of the Investigation
  • Printed Spectrum Analysis of the Target Area’s Electronic Pattern
  • Shortcomings in the Client’s Physical Security Measures which can facilitate Eavesdropping attempts
  • Both Identified and Potential Eavesdropping Threats and Scenarios