Eaves Drop Detection
The security focus of most individuals; companies and organisations
are aimed at visual and physical security such as alarms, guards,
security gates, perimeter fencing, CCTV cameras, security lights and
state of the art access control systems. Due to the fact that these
systems are visually noticeable and also act as a deterrent to a
certain extend for any would-be criminal, it also demonstrates that
the company is serious about protecting its assets and it also
creates a sense of comfort regarding safety and security aspects.
However have you considered the threats that you cannot always
see and that your conventional security systems cannot always detect
and protect you against?
Have you ever given thought to how
you are protecting your most valuable assets, referring to your
confidential information, intellectual property, financials, trade
secrets, confidential and strategic business decisions, product
development, boardroom discussions and any other sensitive
information or even your own private telephone conversations?
Ever wondered how the details of a confidential discussion came
out, or how the opposition came to know about your tender
information, price structures and client base or restructuring
initiatives?
Have you ever considered the consequences of
this information ending up in the wrong hands?
Do not be
naive in your believes that espionage is all about fancy gadgets,
government superspies, fast cars, supermodels and Martinis on a
yacht at some exquisite location!
THINK AGAIN!
Real-world espionage is about gathering information with potential
devastating consequences, using commercially available technology -
available to almost anyone!
The shocking news is that
eavesdropping, industrial espionage and information gathering is a
reality and it is taking place on a daily basis, in fact it became a
thriving business.
It is possible
that someone can be listening and recording your conversations!
It is possible that your phone could be bugged!
It is possible
that a covert video camera can be recording your every move!
It
is possible that covert equipment is monitoring your computers,
passwords and usernames!
We are able to conduct a
comprehensive technical surveillance countermeasures survey in order
to identify the presence of eavesdrop equipment such as radio
frequency (RF) devices- audio & video transmitters, modifications to
existing systems to enable room or telephone monitoring, hardwire
devices, recorders or telephone surveillance devices. We are also
able to follow and advise you on the correct procedures if a device
is located. Following the correct procedures will significantly
increase the possibility of discovering the identity of the
perpetrator or organization responsible for placing the device.
The applications of covert equipment are endless and the
imagination of an eavesdropper will probably be the only restriction
on how to disguise and apply covert equipment.
Any suspicious
device that you might discover should never be touched, attempt to
be removed or be disturbed in any other way. If such a device was
placed by a professional it has the potential to self-destruct,
inflict injury or sent a warning signal to the eavesdropper. Keep
the discovery confidential and preserve the scene as the surrounding
area and the device might contain evidence such as markings and
fingerprints of the perpetrator.
Eavesdropping
without the legally acquired documentation is a criminal offence and
perpetrators can face prosecution. Please note that we are not
allowed to tamper, remove or interfere with any devices legally
installed by government agencies.
Our sweep teams are members
of the following professional associations: