Almost every predisposed concept we have of what a particular criminal should look like will ultimately turn out to be inaccurate. A skilled spy can blend in with almost any environment, utilizing equally covert techniques and tools to collect valuable information on a target. Everyday, corporate spies develop new ways of tapping into competitor’s technology. Those sneaky folks can, and do, look like anyone of us (as opposed to the personified television spy). Something that we often don’t think about is that insiders in our lives, whether they are personal or professional, pose a significant risk to our personal and professional security and proper awareness and monitoring is imperative.
Powerful modern bugging and digital recording devices can easily be hidden in everyday-looking devices such as mobile phones, keychains, thumb drives, computer mouses, pens, power cords, jewelry, clocks, and just about anything else that blends in with the targeted location. Spies no longer need to sit outside a target location in an undercover ACME Pest Control van listening to static on their two-way receiver until their tape recorder battery runs out. Modern devices are tiny and capable of transmitting audio and video for hours across the globe. Traditional espionage tactics of intercepting mail and rifling through the enemy’s garbage looking for carelessly discarded company secrets still exists, but has been amplified by dramatic advancements in technology.
Technical security countermeasures (TSCM), also referred to as technical surveillance countermeasures, is the physical search and electronic scanning of a designated area, such as a home, office, or automobile, to detect electronic surveillance devices, commonly referred to as bugs or bugging devices. TSCM sweeping countermeasures are designed to detect the presence of eavesdropping devices and evaluate the vulnerability of the location or space to covert surveillance techniques.
Thankfully, most bugging devices transmit information through radio waves that can be detected by trained personnel using counter surveillance equipment (radio frequency receivers). Other covert devices that do not emit radio waves need to be flushed-out using equipment that detects magnetic fields and/or electrical noise, or located through a physical search. In addition, thermal cameras may be used to detect residual heat emitting from a concealed power supply to find those extremely well-hidden devices inside walls or other fixed locations.
If you believe that your house, car, office, or other personal space has been compromised by eavesdropping, or you just need some peace of mind, call Forletta today. Forletta employs only the best Technical Security Countermeasure professionals trained and equipped to do the job right. Secure your professional and private space and call Forletta today.