
As leaders in the field of wireless cybersecurity, Spanalytics has decades of experience in performing security audits and penetration testing. Not only do we provide the best analysis tools, but we also have the in-depth training in IoT wireless and cybersecurity needed to customize solutions to your needs.
In cases where the unexpected occurs, here is a checklist you can use to identify the problem and act accordingly.
Step 1: Define the Condition
- Identify the type of condition (EMS, mechanical, electrical, physical).
- Compare observations with expectations—what should be happening vs. what is happening?
- Determine if the condition is consistent, intermittent, or influenced by external factors.
Step 2: Form a Hypothesis
- Identify potential causes:
- EMS: Harmonics, intermodulation, rogue transmissions?
- Mechanical: HVAC noise, ultrasonic leakage, hidden microphone?
- Electrical: Power anomalies, unauthorized modifications?
- Physical: Unapproved installations, tampered devices?
- Ask: Could this condition be naturally occurring, a misconfiguration, or an active surveillance threat?
Step 3: Test the Hypothesis
- When appropriate, conduct controlled experiments to validate or refute your hypothesis:
- EMS: Change environmental variables, perform signal direction-finding.
- Acoustic: Introduce controlled sounds, monitor response.
- Electrical: Measure voltage, disable circuits, check for unauthorized loads.
- Physical: Inspect installations, check for tampering.
Step 4: Evaluate Results & Revise the Hypothesis
- Compare test results with expectations.
- If results confirm the hypothesis, move to risk assessment.
- If results refute the hypothesis, modify assumptions and re-test.
Step 5: Assess the Risk & Threat Level
- Determine if the condition is:
- Harmless or environmental (normal system behavior).
- Operational interference (which affects equipment but is not a security risk).
- Potential surveillance threat (unauthorized emissions, intelligence-bearing signals).
Step 6: Act
- If harmless/environmental: Document and inform relevant personnel.
- If operational interference: Adjust procedures or implement mitigations.
- If a hazard (information is leaving area under test):
- Disable, remove, or neutralize (if authorized).
- Deploy countermeasures (masking noise, shielding, ongoing monitoring).
- If a surveillance threat:
- Preserve evidence for further investigation.
- Report findings to authorized officials.

