Electronic Detection

Electronic Detection, more often referred to as "surveillance," is commonly used to describe observation from a distance by means of electronic equipment or other technological means.

For example:

  • Eavesdropping
  • Telephone tapping
  • Directional microphones
  • Covert listening devices or "bugs"
  • Minox subminiature cameras
  • Closed-circuit television
  • GPS tracking
  • Bait car
  • Electronic tagging
  • CCTV Images
  • Military reconnaissance
  • Reconnaissance aircraft (e.g. Lockheed U-2)
  • Reconnaissance satellites
  • "Trusted" computing devices
  • Internet and computer surveillance

Services Offered

  • Information Security

    With leaps each year in eaves-dropping devices, your company’s proprietary information becomes more vulnerable to adversaries. Our former law enforcement electronic technicians have extensive experience in Technical Surveillance Counter Measures (TSCM).

    In the board room to the lunch room, discussions and e-mails are easy targets for competitors and opposing counsel.

    Covert wireless cameras, recording devices, and many other techniques, pose easy and serious risks to your company’s future.

    At Cavalry, we employ the latest in devices to detect electronic eavesdropping. Our staff is seasoned professionals and comprised of highly-experienced and decorated retired law enforcement to ensure total effectiveness.

  • Computer & Network Analysis

    As part of our extensive service line, Cavalry Protective also offers computer forensic recovery and analysis. According to the American Society of Industries Security, computers play a role in 77% of all illegal breaches of proprietary information. Our computer engineers can dissect the oldest files and establish patterns of impropriety.

  • Complete Service

    Upon conclusion of our investigative program, our managers can consult on an information net that can help withstand this highly competitive market. We provide complete solutions to not only manage your current concerns, but prevent an environment of opportunity for additional and future potential concerns.

    And please remember if you're concerned about your data or communication being compromised, it's best to contact us via alternate means. Your home office, a neighbor's phone, or perhaps a cell phone.