top of page

Protect ALL Your Devices with Odessa

Our Services

State of the Art Malware Detection and Prevention

Whether you suspect malware has been introduced onto your computer from someone you know or an anonymous internet-based threat attempting to steal your banking login information, computer tracking malware can monitor your keystrokes, websites, social media or other computer interfaces and forward that information to an unauthorized third party.

​

This most serious potential malware threat is that of a keylogger. A keylogger is a piece of hardware or software that records all your keystrokes (i.e., what you type into your computer) then either saves them to a log file or transmits them to a third party.

Malicious keyloggers hide on your computer and then potentially steal confidential or security-related information such as passwords, bank accounts, or credit card numbers.

Technical Surveillance Counter Measures (TSCM)

TSCM is an acronym for Technical Surveillance Counter Measures but is typically referred to as a “bug sweep” by the general public. Whatever the reference, it refers to an electronic and physical check or inspection of residence or office to include all rooms as well as any related vehicles or other recreational toys (Boats, Motorcycles etc…)

​

The bottom line is that placing a listening device or hidden camera in a residence or office that you no longer have legal access to is illegal.

At ODESSA, we use state of the art electronics to support an extensive internal and external examination of your vehicle to detect, document and remove any hidden cameras, listening devices or phone tap as well as educate you on how to protect yourself in the future from the introduction of such electronics into your home of business.

Covert GPS Tracker Removal

GPS Tracking devices can be purchased online from various sources that sell private investigation equipment or recreational spy equipment. They are also available from some retail stores that specialize in electronics, video surveillance, and GPS equipment.

There are two main types of vehicle tracking devices:

​

  • Monitored GPS Tracking Devices.

    Used to transmit real-time data about its location, the unit has a device that operates much like a cell phone and relays data anytime it is in motion or at set intervals in some cases.

​

  • Unmonitored GPS Tracking Devices.

    These store intermittent location points detailing the exact whereabouts of the vehicle, but they do NOT actively transmit their location, When the vehicle is in motion, the GPS tracking device collects “waypoints” at set time intervals as map coordinates that must later be reviewed. The unit must be PHYSICALLY retrieved to obtain the tracking information.  

    While some can be hardwired into the vehicle for power supply, internal diagnostics jacks, most are battery operated. Battery-operated tracking devices usually have a sensor that determines when the tracker is in motion and initiates power and signal transmission at that time, then turns off after it has not moved for several minutes. Tracking data is sent to an internet-connected computer or to a smartphone for instant, real time location data.

  • We use state of the art electronics to support an extensive internal and external examination of your vehicle to detect and remove covert GPS tracking devices as well as educate you on how to protect yourself in the future from electronic privacy compromise.

Computer Spyware Removal

Whether you suspect malware has been introduced onto your cellular mobile device from someone you know or an anonymous internet-based threat attempting to steal your banking login information, computer tracking malware can monitor your keystrokes, websites, social media or other computer interfaces and forward that information to an unauthorized third party. This most serious potential mobile malware threat is that of a keylogger.
 

A keylogger is a piece of hardware or software that records all your keystrokes (i.e., what you type or talk into your mobile device) then either saves them to a log file or transmits them to a third party. Malicious keyloggers hide on your mobile device and then potentially steal confidential or security-related information such as passwords, bank accounts, or credit card numbers.

Cellular Spyware Removal

Whether you suspect malware has been introduced onto your cellular mobile device from someone you know or an anonymous internet-based threat attempting to steal your banking login information, computer tracking malware can monitor your keystrokes, websites, social media or other computer interfaces and forward that information to an unauthorized third party. This most serious potential mobile malware threat is that of a keylogger.

A keylogger is a piece of hardware or software that records all your keystrokes (i.e., what you type or talk into your mobile device) then either saves them to a log file or transmits them to a third party. Malicious keyloggers hide on your mobile device and then potentially steal confidential or security-related information such as passwords, bank accounts, or credit card numbers.

Other indicators that may signal keylogging or other tracking malware on your mobile device are:

​

Pop-ups:
Does your Internet browser suddenly seem overwhelmed with pop-up adds. Many websites do have pop-up ads but if you start seeing pop-ups all the time, especially for products or services that seem suspicious, you may have a problem.
 

Spike in Data usage:
Check your data usage. An early indication that your phone has a potential virus is the rapid use of cellular data. The reason is that when your phone has become infected by malware, the malware will use your phone’s data source to show advertisements with potential malicious links or to send information to third party sources.
 

Crashing apps:
Another potential sign of infection is unexplained “crashing” applications. For example, you are playing “Angry Birds”, and your phone crashes. That’s seems strange to you because it never happened in the past. This is not unusual in the malware world as most viruses tamper with your regular operations, it’s common for your favorite apps to crash without explanation.
 

Overheating of phone and/or sudden poor performance:
When your phone is infected with malware, it uses up your phones resources so pay attention if your phone starts heating up unexplainably


Charges You Cannot Explain or Did Not Authorize:
These unknown charges will mysteriously appear on your phone’s primary app store billing account. Sources say it is very common under the Android system who often report unusual charges in the “SMS” category since hackers can then use their “infected” phone to send messages to premium rate numbers.


Unwanted apps:
These applications are notorious in nature and designed to look like real apps and avoid detection. For example, what may look like a legitimate working calculator, may in fact be harvesting your personal data to an off shore 3rd party entity.


Battery drain:
All the above issues take a lot of energy. Not only does your phone use up more data, but more data use makes your battery life run out more quickly. If you notice your mobile device is suddenly running out of battery life much quicker than normal, this may be cause for concern. Pop-ups: Does your Internet browser suddenly seem overwhelmed with pop-up adds. Many websites do have pop-up ads but if you start seeing pop-ups all the time, especially for products or services that seem suspicious, you may have a problem.


Browser Re-Direction:
Malware will often re-direct you to a website you were not looking for. For instance, if you try to open www.google.com and you end up at a vacation site in Antigua, you most likely have some form of malware.

Customized Cyber Malware Detection and Protection

Whether its your phone, Ipad, computer or vehicle, ODESSA analysis determines your threat level and integrates to keeps you safe from ransomware and other nefarious malware in an era of unprecedented attacks.

bottom of page