top of page
Spectrum Sweep.jpg

Radio Transmission Sweep

Radio Frequency (RF) vulnerabilities are more complex in terms of differentiating between legitimate RF devices deployed as part of company owned infrastructure and illegal interception devices which utilizes some form of RF distribute the intercepted information. 

f6a15f_0bb1fe5d0ff147528384d5407313ba25~mv2_edited_edited.png
Near Field RF_edited_edited.png

08

RF (Nearfield) Sweep

Wi-Fi routers, access points and Bluetooth devises means that a somewhat more rigorous assessment must be conducted. For the less sophisticated deployment of RF devices, we conduct a nearfield RF “sweep” which adheres to, as does all our tests, to a very specific standard operating procedure. Data is collected and recorded to ensures that we have a scientifically determined baseline against which future measurements can be compared.

09

RF (Free Space) Sweep

To respond to the more complex RF challenges we deploy a combination of Software Defined Radios and RF Spectrum Analyzers. This allows us to consider the RF vulnerabilities with more depth across a frequency range up to 12GHz as standard, but with the option of expanding this up to 50GHz where the risk dictates such expansion. This speaks to the scalability of our service.

RF 1.jpg
RF 3_edited_edited_edited.png
bottom of page