Back to Case Studies
Case Study 9

Securing Critical Infrastructure in Ahmedabad

A command-center investigation revealed a hardware keylogger and audio bridge disguised as a standard network cable on a grid-monitoring workstation.

Service

TSCM, Espionage Detection, and Bug Detection Services

Location

Sumel-7 / SG Highway, Ahmedabad, Gujarat

Industry

Government / Critical Infrastructure (Energy & Power)

Subject Matter Expert

Wahid Shaikh (TSCM Expert, Risk Advisor, and President of Orion Intelligence Group)

Service Provider

Indiebim Technology Solutions Private Limited

1

The Challenge

In early 2026, a government-affiliated body overseeing critical power distribution in Gujarat suspected a targeted espionage attempt involving smart-grid vulnerabilities and upcoming energy tenders.

2

The Problem

The Ahmedabad site faced high EMF interference from nearby power infrastructure and dense cellular traffic, making it harder to separate normal signal activity from malicious devices.

  • Audio transmitter detection for low-frequency bugs.
  • Hidden camera detection around control room screens.
  • Cyber-physical threats from illicit hardware on secure network ports.
3

The Action

Wahid Shaikh led a multi-layered infrastructure integrity sweep using a credibility-first methodology designed for technically complex, government-sensitive environments.

  • Broadband RF analysis using OSCOR Blue up to 24 GHz.
  • LAN and VoIP inspection using TALAN 3.0.
  • NLJD grid scans across partitions and ceiling tiles for passive bugs.
4

The Findings

The sweep of the operations manager’s office uncovered a hardware keylogger and audio bridge disguised as a standard internal network cable plugged into a workstation facing the main monitoring screens.

The device captured keystrokes and streamed audio when it detected a specific voice frequency.

5

The Solution

  • Locked all non-essential ports and applied tamper-evident seals to workstations.
  • Conducted TSCM training on visual bug detection for senior officials.
  • Redesigned visitor access protocols around critical workstations.
6

Outcome

The operation neutralized a major vulnerability and protected sensitive power-grid intelligence from a likely high-level industrial or state-sponsored threat.

Technical Appendix

  • REI OSCOR Blue for signal analysis in high-interference zones.
  • NLJD for hidden silicon junctions in walls and furnishings.
  • FLIR thermal imaging for modified network hardware heat signatures.
Quick FAQ

Frequently Asked Questions