Investigations employs professional investigators with many years of experience
and training who are skilled at managing complex surveillance projects, using
advanced technical equipment.
espionage technologies and bug detection
We perform technological surveillance
counter-measures, provide consultation and perform risk surveys. The counter-measures
are performed as per protocol / comprehensive technical specifications for
covering the range of possible threats that exist in the civilian sector, based
on risk evaluations.
The detection process includes electronic, visual and physical checks in order
to monitor and
locate technological measures for listening, photographing and/or documenting
on computer systems. We check spaces, wired communication, wireless transmissions,
computer infrastructure, telephones and peripheral units.
In addition, Code Investigations performs checks to locate bugging devices on
phone lines, and checks to locate
wireless transmitters (audio/video).
Locating transmitters that
are active, on standby or dormant
Locating transmitters on
electrical power lines, electrical outlets, communication lines and
Locating cellular and Wi-Fi
transmitters that are active, on standby or dormant
Locating hidden microphones
Locating recording devices
that are active, on standby or dormant
Locating positioning and
tracking systems (GPS)
Checking vehicles to locate
and expose positioning and tracking systems (GPS), recording devices, and
Locating and identifying
weak points, breaches and spy programs in computer and telephone line systems
Data recovery from cell
phones, tablets, digital recording devices and memory storage devices.
Checking cell phones and
tablets to locate and expose spy programs
have an advanced computerized system for recovering data from cell phones,
tablet system, flash drives (including digital recording devices) and locating spy
programs (malware). This system is among the most advanced systems for
forensics and identifying spy programs, and it is used by law enforcement
agents and investigative and intelligence agencies in Israel and abroad.
system's programs for analyzing and exposing spyware are updated each day.
Collecting, analyzing, and restoring
erased or damaged data from cell phones, tablets, digital recording devices and
memory storage devices. The data can also be analyzed.
Checking cell phones and
tablets to locate and expose spy programs (malware).
note that the bugging and tracking of cell phones performed by law enforcement
agencies cannot be exposed or monitored due to the use of various special