Operational Services
S2K provides a comprehensive range of Covert operational services, including Covert Human Surveillance Teams, Protective Surveillance Teams, Technical Surveillance Installation, Security Consultancy, Penetration Testing, and High-Threat Security. Each service is delivered with precision and professionalism, tailored to meet the unique demands of our clients in any environment.
-
S2K specialises in the delivery of ethical, proportionate, and intelligence-led Covert Human Surveillance operations across the UK. Our team comprises former Home Office surveillance officers and UKSF-trained operators with extensive experience conducting sensitive surveillance deployments in support of law enforcement, corporate, and private clients.
We are tasked when discretion, precision, and trust are non-negotiable. Whether it’s a long-term lifestyle assessment, internal misconduct inquiry, insurance fraud, or complex civil litigation, our covert teams can operate undetected in rural, urban, and high-footfall environments.
Every deployment is meticulously planned and governed by the principles of legality, necessity, and proportionality. Prior to tasking, all operations are assessed for risk, client need, and evidential value. Once on task, our surveillance teams blend seamlessly into the operating environment, delivering high-grade intelligence that is time-stamped, securely handled, and court-ready where required.
What sets us apart:
Proven track record supporting high-stakes legal and private investigations
Detailed pre-deployment planning and recce to identify risks and optimise positioning
Access to highly trained, internally vetted personnel who have passed our own rigorous accredited training programme
Post-deployment analysis and evidential reporting delivered to professional standards
S2K is not a broker or intermediary — we deploy our own people. Individuals who have been trained by us, tested by us, and trusted by us. This internal pipeline ensures operational continuity, integrity, and consistent delivery for our clients.
-
Our Protective Surveillance service offers discreet, intelligence-led security for individuals, corporate teams, and high-risk meetings — providing an unobtrusive yet highly effective protective buffer around our clients. This service is ideal for those who do not require, or do not wish to be seen with, an overt Close Protection team, but still require a layer of professional security and early warning.
Delivered by operatives with backgrounds in UK Special Forces and government surveillance units, our approach allows us to detect and assess potential threats before they materialise, ensuring your safety without disrupting your routine, schedule, or public profile.
Protective Surveillance is particularly suited for:
Individuals under potential threat who wish to move freely without overt security
Clients attending sensitive business meetings or hostile corporate negotiations
Families or executives travelling abroad or within the UK who require a quiet security presence
Celebrities or public figures seeking low-profile security during public appearances
All operations are meticulously planned, intelligence-driven, and conducted with absolute discretion. With a proven track record supporting clients across legal, corporate, and private sectors, we deliver peace of mind in complex and sensitive environments.
-
Our Technical Surveillance capability provides clients with discreet, covert monitoring solutions that are ethically planned, legally compliant, and executed to the highest standards. Led by Home Office-qualified Technical Surveillance Officers, each deployment is tailored to meet specific operational objectives while maintaining the integrity and legality of the operation.
We specialise in the full lifecycle of technical surveillance deployments — from initial planning and reconnaissance, to the design and construction of bespoke hides, through to the precise installation, remote monitoring, and final recovery of the device. Every element is meticulously considered: sightlines, concealment, power management, signal integrity, evidential continuity, and environmental factors.
This service is ideal for:
Long-term monitoring of static locations where physical presence is not viable
High-risk environments where low-profile observation is essential
Supplementing physical surveillance teams with a 24/7 technical overwatch capability
Situations requiring covert audio-visual evidence gathering to support legal or corporate investigations
Our approach is founded on operational discipline, due diligence, and an in-depth understanding of surveillance law and procedure. With a proven track record supporting law firms, corporate security departments, and private clients, our technical teams deliver high-quality intelligence without compromise — ensuring the right information is obtained, safely and securely.
-
S2K provide discreet, high-level Technical Surveillance Counter Measures (TSCM) operations for private, corporate, and legal-sector clients across the UK. Also known as electronic bug sweeping, TSCM involves the detection, identification, and neutralisation of illicit surveillance devices — from covert audio bugs and hidden cameras to GPS trackers and wireless transmitters.
Our TSCM services are led by former Home Office technical specialists with decades of experience operating in sensitive environments, including government facilities, private residences, commercial premises, and mobile platforms. Each deployment is structured, thorough, and conducted to the highest technical standard.
What we offer:
Full RF spectrum analysis to identify unauthorised transmissions
Physical and thermal inspection for hardwired or dormant devices
GPS tracker sweeps for vehicles, including long-term passive devices
Detection of Wi-Fi, Bluetooth, GSM, 3G/4G/5G, and other signal-based threats
Comprehensive reporting, including findings, mitigation advice, and evidence logs
Aftercare support and guidance on reducing future vulnerabilities
All TSCM operations are conducted in strict confidence, with minimal disruption to your property or schedule. Our processes follow the principles of necessity, legality, and discretion — designed to protect you, your reputation, and your operational integrity.
S2K’s TSCM capability is not a bolted-on service. It is a specialist strand of our operational output, delivered by professionals with proven track records in high-threat and high-value environments.
-
Our Red Team operations – often referred to as penetration testing – are designed to rigorously assess the physical, technical, and human security measures protecting your organisation. These operations simulate real-world threats in a controlled, ethical, and legally compliant manner to expose vulnerabilities that could be exploited by hostile actors.
S2K's penetration testing services are led by former UK Special Forces and Home Office surveillance professionals with extensive experience in hostile environment operations, infiltration techniques, and counter-intelligence methodologies. Every engagement is bespoke, developed in collaboration with the client to define clear objectives, boundaries, and success criteria.
We test and challenge:
Physical security (access control, alarm systems, perimeter integrity)
Personnel awareness and insider threat resilience
Procedural vulnerabilities and access routines
Digital hygiene, social engineering susceptibility, and information leakage
Operations may include covert reconnaissance, lock bypass, tailgating, impersonation, and secure area breaches — all conducted with a strict chain of custody and full debriefing protocols.
At S2K, we don’t offer generic off-the-shelf audits. We offer high-fidelity red team simulations rooted in real operational experience. The result: meaningful, actionable feedback that helps organisations strengthen their defences before someone with intent tests them for real. Our track record includes successful red team deployments across government, corporate, and critical infrastructure sectors.
-
At S2K, our Security Consultancy service is built on decades of combined operational experience at the highest levels of UK Government and Defence. Our consultants bring expertise shaped by service within United Kingdom Special Forces, Home Office surveillance units, and the Foreign, Commonwealth & Development Office. This unique blend of backgrounds enables us to deliver risk-informed, pragmatic, and discreet security advice across a wide range of sectors.
We work closely with clients to assess, design, and implement security frameworks that are proportionate, effective, and aligned with the specific threats they face. Whether you're a corporate entity, a private client, or a high-net-worth individual, our consultancy packages are bespoke — developed through direct dialogue, site assessments, and intelligence-led analysis.
Our consultancy services include:
Threat and risk assessments (physical, technical, and procedural)
Protective surveillance planning
Travel and hostile environment risk preparation
Facility penetration testing and security audits
Behavioural detection and insider threat analysis
Training needs assessments and capability development
We take pride in offering not just reports and recommendations, but practical, operationally sound solutions that can be actioned immediately. Every assessment is delivered with confidentiality, clarity, and the strategic foresight needed to futureproof your security posture.
S2K’s consultancy is trusted by legal professionals, private security companies, event organisers, and individuals operating in high-risk environments — all seeking guidance they can trust, from professionals who’ve been there and done it.