Back to Case Studies
Case Study 10

Protecting Proprietary FinTech Algorithms in Chennai

A fast-growing FinTech startup discovered that a legitimate-looking smart thermostat was secretly operating as a voice-triggered Wi-Fi listening bridge.

Service

TSCM, Debugging Services, and Audio Transmitter Detection

Location

Old Mahabalipuram Road (OMR), Chennai, Tamil Nadu

Industry

FinTech / Software Development

Subject Matter Expert

Wahid Shaikh (TSCM Expert, Risk Advisor, and Chief Investigative Officer)

Service Provider

Indiebim Technology Solutions Private Limited

1

The Challenge

A high-growth FinTech startup on Chennai’s OMR suspected that proprietary logic for a new high-frequency trading tool was being replicated by a rival firm shortly after internal discussions.

The CEO concluded the leak was happening through the walls of the executive conference room, not the firewall.

2

The Problem

Industrial-style office interiors with exposed ceilings, ducts, and glass partitions offer countless hiding spots for covert hardware and IoT-based surveillance.

  • Audio transmitter detection in a high-density wireless environment.
  • Audio recorder detection in exposed ceiling infrastructure.
  • Threats for corporate integrity during a critical funding cycle.
3

The Action

Wahid Shaikh led a specialized team from Indiebim to conduct a sweep covering both traditional bugs and smart IoT devices.

  • Wireless activity monitoring to inventory authorized MAC addresses and identify ghost devices.
  • Physical duct inspections using video pole cameras.
  • NLJD scans across war-room furniture and fittings.
4

The Findings

The team discovered a MEMS microphone and Wi-Fi bridge hidden inside a legitimate-looking smart thermostat mounted opposite the CEO’s preferred seat.

The device drew power from HVAC control lines and uploaded encrypted files to a cloud server during lunch breaks when office Wi-Fi traffic was highest.

5

The Solution

  • Removed the bug and handed forensic data to the legal team.
  • Advised on a dedicated physical security VLAN for IoT devices.
  • Installed ultrasonic audio jammers in the war room.
6

Outcome

The startup secured its intellectual property and continued its Series-C process with confidence that physical espionage had been contained.

Technical Appendix

  • WAM-X25 for identifying complex Wi-Fi, Bluetooth, and cellular signals.
  • Video pole camera for high exposed ceilings.
  • Spectrum analyzer for unauthorized transmissions hidden within normal traffic.
Quick FAQ

Frequently Asked Questions