Operational Services

S2K provides a comprehensive range of Covert operational services, including Covert Human Surveillance Teams, Protective Surveillance Teams, Technical Surveillance Installation, Security Consultancy, Penetration Testing, and High-Threat Security. Each service is delivered with precision and professionalism, tailored to meet the unique demands of our clients in any environment.

  • S2K specialises in the delivery of ethical, proportionate, and intelligence-led Covert Human Surveillance operations across the UK. Our team comprises former Home Office surveillance officers and UKSF-trained operators with extensive experience conducting sensitive surveillance deployments in support of law enforcement, corporate, and private clients.

    We are tasked when discretion, precision, and trust are non-negotiable. Whether it’s a long-term lifestyle assessment, internal misconduct inquiry, insurance fraud, or complex civil litigation, our covert teams can operate undetected in rural, urban, and high-footfall environments.

    Every deployment is meticulously planned and governed by the principles of legality, necessity, and proportionality. Prior to tasking, all operations are assessed for risk, client need, and evidential value. Once on task, our surveillance teams blend seamlessly into the operating environment, delivering high-grade intelligence that is time-stamped, securely handled, and court-ready where required.

    What sets us apart:

    • Proven track record supporting high-stakes legal and private investigations

    • Detailed pre-deployment planning and recce to identify risks and optimise positioning

    • Access to highly trained, internally vetted personnel who have passed our own rigorous accredited training programme

    • Post-deployment analysis and evidential reporting delivered to professional standards

    S2K is not a broker or intermediary — we deploy our own people. Individuals who have been trained by us, tested by us, and trusted by us. This internal pipeline ensures operational continuity, integrity, and consistent delivery for our clients.

  • Our Protective Surveillance service offers discreet, intelligence-led security for individuals, corporate teams, and high-risk meetings — providing an unobtrusive yet highly effective protective buffer around our clients. This service is ideal for those who do not require, or do not wish to be seen with, an overt Close Protection team, but still require a layer of professional security and early warning.

    Delivered by operatives with backgrounds in UK Special Forces and government surveillance units, our approach allows us to detect and assess potential threats before they materialise, ensuring your safety without disrupting your routine, schedule, or public profile.

    Protective Surveillance is particularly suited for:

    • Individuals under potential threat who wish to move freely without overt security

    • Clients attending sensitive business meetings or hostile corporate negotiations

    • Families or executives travelling abroad or within the UK who require a quiet security presence

    • Celebrities or public figures seeking low-profile security during public appearances

    All operations are meticulously planned, intelligence-driven, and conducted with absolute discretion. With a proven track record supporting clients across legal, corporate, and private sectors, we deliver peace of mind in complex and sensitive environments.

  • Our Technical Surveillance capability provides clients with discreet, covert monitoring solutions that are ethically planned, legally compliant, and executed to the highest standards. Led by Home Office-qualified Technical Surveillance Officers, each deployment is tailored to meet specific operational objectives while maintaining the integrity and legality of the operation.

    We specialise in the full lifecycle of technical surveillance deployments — from initial planning and reconnaissance, to the design and construction of bespoke hides, through to the precise installation, remote monitoring, and final recovery of the device. Every element is meticulously considered: sightlines, concealment, power management, signal integrity, evidential continuity, and environmental factors.

    This service is ideal for:

    • Long-term monitoring of static locations where physical presence is not viable

    • High-risk environments where low-profile observation is essential

    • Supplementing physical surveillance teams with a 24/7 technical overwatch capability

    • Situations requiring covert audio-visual evidence gathering to support legal or corporate investigations

    Our approach is founded on operational discipline, due diligence, and an in-depth understanding of surveillance law and procedure. With a proven track record supporting law firms, corporate security departments, and private clients, our technical teams deliver high-quality intelligence without compromise — ensuring the right information is obtained, safely and securely.

  • S2K provide discreet, high-level Technical Surveillance Counter Measures (TSCM) operations for private, corporate, and legal-sector clients across the UK. Also known as electronic bug sweeping, TSCM involves the detection, identification, and neutralisation of illicit surveillance devices — from covert audio bugs and hidden cameras to GPS trackers and wireless transmitters.

    Our TSCM services are led by former Home Office technical specialists with decades of experience operating in sensitive environments, including government facilities, private residences, commercial premises, and mobile platforms. Each deployment is structured, thorough, and conducted to the highest technical standard.

    What we offer:

    • Full RF spectrum analysis to identify unauthorised transmissions

    • Physical and thermal inspection for hardwired or dormant devices

    • GPS tracker sweeps for vehicles, including long-term passive devices

    • Detection of Wi-Fi, Bluetooth, GSM, 3G/4G/5G, and other signal-based threats

    • Comprehensive reporting, including findings, mitigation advice, and evidence logs

    • Aftercare support and guidance on reducing future vulnerabilities

    All TSCM operations are conducted in strict confidence, with minimal disruption to your property or schedule. Our processes follow the principles of necessity, legality, and discretion — designed to protect you, your reputation, and your operational integrity.

    S2K’s TSCM capability is not a bolted-on service. It is a specialist strand of our operational output, delivered by professionals with proven track records in high-threat and high-value environments.

  • Our Red Team operations – often referred to as penetration testing – are designed to rigorously assess the physical, technical, and human security measures protecting your organisation. These operations simulate real-world threats in a controlled, ethical, and legally compliant manner to expose vulnerabilities that could be exploited by hostile actors.

    S2K's penetration testing services are led by former UK Special Forces and Home Office surveillance professionals with extensive experience in hostile environment operations, infiltration techniques, and counter-intelligence methodologies. Every engagement is bespoke, developed in collaboration with the client to define clear objectives, boundaries, and success criteria.

    We test and challenge:

    • Physical security (access control, alarm systems, perimeter integrity)

    • Personnel awareness and insider threat resilience

    • Procedural vulnerabilities and access routines

    • Digital hygiene, social engineering susceptibility, and information leakage

    Operations may include covert reconnaissance, lock bypass, tailgating, impersonation, and secure area breaches — all conducted with a strict chain of custody and full debriefing protocols.

    At S2K, we don’t offer generic off-the-shelf audits. We offer high-fidelity red team simulations rooted in real operational experience. The result: meaningful, actionable feedback that helps organisations strengthen their defences before someone with intent tests them for real. Our track record includes successful red team deployments across government, corporate, and critical infrastructure sectors.

  • At S2K, our Security Consultancy service is built on decades of combined operational experience at the highest levels of UK Government and Defence. Our consultants bring expertise shaped by service within United Kingdom Special Forces, Home Office surveillance units, and the Foreign, Commonwealth & Development Office. This unique blend of backgrounds enables us to deliver risk-informed, pragmatic, and discreet security advice across a wide range of sectors.

    We work closely with clients to assess, design, and implement security frameworks that are proportionate, effective, and aligned with the specific threats they face. Whether you're a corporate entity, a private client, or a high-net-worth individual, our consultancy packages are bespoke — developed through direct dialogue, site assessments, and intelligence-led analysis.

    Our consultancy services include:

    • Threat and risk assessments (physical, technical, and procedural)

    • Protective surveillance planning

    • Travel and hostile environment risk preparation

    • Facility penetration testing and security audits

    • Behavioural detection and insider threat analysis

    • Training needs assessments and capability development

    We take pride in offering not just reports and recommendations, but practical, operationally sound solutions that can be actioned immediately. Every assessment is delivered with confidentiality, clarity, and the strategic foresight needed to futureproof your security posture.

    S2K’s consultancy is trusted by legal professionals, private security companies, event organisers, and individuals operating in high-risk environments — all seeking guidance they can trust, from professionals who’ve been there and done it.