info
www.auroradesigns.co.za

 

Eaves Drop Detection

Eavesdrop Detection

The security focus of most individuals; companies and organisations are aimed at visual and physical security such as alarms, guards, security gates, perimeter fencing, CCTV cameras, security lights and state of the art access control systems. Due to the fact that these systems are visually noticeable and also act as a deterrent to a certain extend for any would-be criminal, it also demonstrates that the company is serious about protecting its assets and it also creates a sense of comfort regarding safety and security aspects.

However have you considered the threats that you cannot always see and that your conventional security systems cannot always detect and protect you against?

Have you ever given thought to how you are protecting your most valuable assets, referring to your confidential information, intellectual property, financials, trade secrets, confidential and strategic business decisions, product development, boardroom discussions and any other sensitive information or even your own private telephone conversations?

Ever wondered how the details of a confidential discussion came out, or how the opposition came to know about your tender information, price structures and client base or restructuring initiatives?

Have you ever considered the consequences of this information ending up in the wrong hands?


Do not be naive in your believes that espionage is all about fancy gadgets, government superspies, fast cars, supermodels and Martinis on a yacht at some exquisite location!

THINK AGAIN!
Real-world espionage is about gathering information with potential devastating consequences, using commercially available technology - available to almost anyone!
The shocking news is that eavesdropping, industrial espionage and information gathering is a reality and it is taking place on a daily basis, in fact it became a thriving business.

It is possible that someone can be listening and recording your conversations!
It is possible that your phone could be bugged!
It is possible that a covert video camera can be recording your every move!
It is possible that covert equipment is monitoring your computers, passwords and usernames!

We are able to conduct a comprehensive technical surveillance countermeasures survey in order to identify the presence of eavesdrop equipment such as radio frequency (RF) devices- audio & video transmitters, modifications to existing systems to enable room or telephone monitoring, hardwire devices, recorders or telephone surveillance devices. We are also able to follow and advise you on the correct procedures if a device is located. Following the correct procedures will significantly increase the possibility of discovering the identity of the perpetrator or organization responsible for placing the device.





The applications of covert equipment are endless and the imagination of an eavesdropper will probably be the only restriction on how to disguise and apply covert equipment.

Any suspicious device that you might discover should never be touched, attempt to be removed or be disturbed in any other way. If such a device was placed by a professional it has the potential to self-destruct, inflict injury or sent a warning signal to the eavesdropper. Keep the discovery confidential and preserve the scene as the surrounding area and the device might contain evidence such as markings and fingerprints of the perpetrator.

Eavesdropping without the legally acquired documentation is a criminal offence and perpetrators can face prosecution. Please note that we are not allowed to tamper, remove or interfere with any devices legally installed by government agencies.

Equipment Utilised During TSCM Survey  Download PDF >>

Our sweep teams are members of the following professional associations:  Click to visit their website pages