"Illicit Eavesdropping Detection Services"
Are you concerned about the possibility of an eavesdropping attempt against you or your business?
- Ask yourself what you have observed. Are there quantifiable losses?
- Ask yourself what is at stake. What do you have that a competitor may want or know?
- Could you be the victim of a hostile employee or even a family member? Are you the victim of stalking?
- Are you considering running for public office? Are you involved in a custody battle? Estate issues? Family business dissolution?
- Are you in critical negotiations with Unions?
- Is there money to be divided among competing parties?
- Is there a former business partner looking for competitive advantage?
- Could violations of non-compete clauses be in play? How do people know things they shouldn't?
- Why would a perpetrator risk criminal charges for eavesdropping.
Time Magazine reports the reality & a Bugging Device under construction
Other possible causes for eavesdropping suspicions:
- Surveillance: In domestic situations, is it possible the other party hired a private investigator to follow you and record your every move and the other party is using that information for daily harassment purposes?
- What is/was in your trash?
- Phone records: Who has/had access to your phone, SIM card, passwords, etc.?
- Keystroke loggers (physical or software): Are your e-mails being read?
If you have concerns based on the above, have you considered doing the following:
If you have considered these but you still suspect you are the target of eavesdropping, then maybe a TSCM is in order.
- Evaluating your document control procedures
- Evaluating computer security, with particular attention paid to firewalls
- Vetting employees
- Inventory practices and procedures
- Utilize "clean" or "non-suspect" phones for sensitive communications
If so, and you still suspect compromises of information, then maybe a TSCM / Debugging survey is in order.
TSCM Survey - Low to Mid & High Range Threat Level
This service is designed to address eavesdropping attacks involving low to mid to high-range technology bugs specifically designed for eavesdropping purposes, electronic devices illegally used for eavesdropping and other surveillance techniques. Off-the-shelf bugs (designed specifically for eavesdropping) can easily be purchased from internet sites dealing in spy equipment or from auction sites, such as eBay.
There are kits that can be purchased from electronics stores with all of the components necessary to make a simple, but effective eavesdropping device, even if it is not the intention of the seller to promote it as such. Examples of electronic devices illegally and covertly used for eavesdropping include baby monitors, tape recorders, wireless microphones, family band two-way radios and spy shop cameras.
Protected information at this level should be considered proprietary and confidential by the company or the individual.
A benefit from a TSCM survey is that security weaknesses will be identified, including document control, personnel access, physical security, sound attenuation issues, etc. This may, in and of itself, identify the source for the information loss. The stronger the security posture of the company, the harder it will be for an eavesdropper to penetrate the facility.
All services are confidential. Written reports provided by Gauge Group to the client are treated as confidential. What is included in a Basic TSCM survey provided by Gauge Group?
An initial off-site meeting that identifies the client's concerns and vulnerabilities, a review of the facility blueprints or layout and a threat assessment identifying possible parties who may have motive to spy on the client or the client's business. Remember, an eavesdropping threat located within office space may be directed solely against an individual and not toward the company proper. It is also at this point that the client must decide what he/she wants to do if a bug is found.
In some cases, notifying law enforcement is not optional.
Once the client commissions TSCM services, a physical walk-through of the facility follows. A time is then determined to conduct the sweep, which includes:
- A thorough physical search of the target area(s) for hidden microphones, transmitters, tape or digital recorders, concealed video cameras/transmitters and any other eavesdropping devices.
- A radio frequency (RF) analysis that evaluates the airways for evidence of unauthorized transmissions (includes audio and video, analogue/digital/microwave).
- An infrared evaluation a magnetic and an acoustic leakage evaluation of all appropriate areas.
- Evaluation of AC/DC power lines to detect hard-wired/wireless transmitting devices. Including VLF (very low frequency) probe detection for carrier current transmitters.
- Sound attenuation tests.
- A telephone system analysis including instruments, local phone distribution system, wiring and peripheral equipment to determine phone or wire taps.
- A physical search and electronic survey of office equipment (fax machines, etc.) for eavesdropping devices.
- An oral report upon completion of the survey, followed by a detailed written report that identifies survey parameters, findings, observations and recommendations.
[Note: Computers and/or computer systems that may require extensive forensic evaluation will be charged separately from the TSCM survey. The threats directed against computer systems are extensive and a thorough evaluation of these systems is a core competency in and of itself. Gauge Group has a computer forensics expert on staff.] Some of the equipment utilized by Gauge Group for TSCM services (yes, there is recognized equipment in the field):
- Research Electronics International (REI) CPM-700 broadband receiver with the complete set of probes with capabilities up to 12Ghz.
- REI CMA-100 TSCM amplifier for wire analysis.
- Secondary Equipment - High sensitivity CSR PRO 6105 (Mossad / Israeli designed & Government Device) capabilities up to 8GHz with full set of probes
- The Winkelman 'Searcher' - a handheld compact non-linear junction detector used for the detection and locating of electronic semi-conductor circuits (bugs) hidden in construction, custom built bugs in office/household items, furniture etc.
- Spectran EME & RF Spectrum Analyser (V3)
- Fluke LAN meters, Electronics toners and probes, digital multi-meters, voltmeters
- Inspection Scopes and Tools
- DET-2 Frequency Verification Counters
CPM-700 Counter-Surveillance Probe/Monitor
The CPM-700 is a broadband receiver designed to detect and locate all major types of electronic surveillance devices including room, phone, body bugs, video transmitters, and tape recorders. The probes include detection of Infra-Red, VLF, Carrier current, Burst and spread spectrum devices.
Broadband receivers such as the CPM-700 serves as a very important tool for our professional sweep teams, government security personnel with important security needs.
CPM 700 Portable Sweep Kit - provides everything needed to perform a professional sweep; fits inside a standard briefcase.
Multi-Functional Utility - Comes with probes to detect RF transmitters (audio and video), carrier current transmitters, and telephone bugs. Probes are also available to detect for infra-red transmitters, tape recorders, and acoustic leakage.
Wideband Coverage - from 200Hz to over 3GHz with no holes or gaps.
Coverage goes to 12 GHz with the BPM-1200 broadband antenna.
Monitor Mode - after a sweep, the alarm monitor (silent or audible alert) guards against new devices brought in or remote control activation of surveillance devices.
Auxiliary Audio Input - allows user to listen to telephones or lines for "hotmikes," hookswitch by-pass and "infinity" bugs. Unknown wires and cables can be tested for wired microphones.
Fluke LAN Metre