The following devices can be found and ordered (purchased) over the internet from foreign spy device suppliers, shipped to the US and rarely intercepted by US Customs.

A device that can be cleverly concealed in a FAX machine, which will copy all faxed documents along with the phone numbers and at a later time, upon a command from the bad guy, download all of the copies. This device can also be commanded, by the bad guy, to turn on an amplified microphone to monitor the conversations around the fax machine. There are many configurations that are available.

A similar device to the FAX bug can be installed in a printer or copy machine. Most of the newer copy machines utilize a hard drive that maintains a copy of every document copied (scanned). These are easily accessed by service techs or “others” that have physical access to the office area.

Most offices utilize shredders; some have a large collection box which is periodically picked up by a trusted shredding company.  Others utilize the small standalone units. There is an overseas company that provides a bugged shredder that has a hidden digital scanner built into the injected molded plastic document insertion top.

There are 3 models:

  1. One has a hidden micro SD card that will hold 30k to 40k ofdocuments.
  2. One has an electrical “digital carrier current” transmitter that transmits the documents over the electrical power lines to a matched receiver somewhere else in the building. That receiver has a printer connected so that while the document is being shredded in one office, it is being printed out in another office.
  3. The third model incorporates a RF transmitter/receiver which is connected to a document storage device. This allows the bad guy to pull his vehicle into the office parking lot and transmit a RF signal to the shredder (similar to a garage door opener) which causes the unit to “burst transmit” all of the stored documents to the bad guy’s receiver.

Several overseas companies offer Cellular bugs, which are an entire cell phone packaged in a tiny circuit, cleverly hidden in innocent appearing appliances, i.e.: Computer Mouse, Computer Keyboard, Power Strip Surge Suppressor, Table Clock, Wall Clock, Wall Thermostat, Clock Radio, Electric Pencil Sharpener, and many more devices that have an ongoing electrical power source. They even have them designed for monitoring you in your car with a bugged Radar Detector and Car DC to AC Power Inverter.

For those offices or homes that utilize Comcast, Bright house, AT&T U-verse, etc. BEWARE… If they provide broadband for your computers and VoIP for your phone service, you can be monitored by the bad guys. All cable subscribers have an IP address. This is so that the cable company can perform remote diagnostics, firmware and software modifications and upgrades. There are a number of software programs available, i.e. (Wireshark), that will allow the bad guys to invade your IP address (by “spoofing” the carrier for the address) and monitor your VoIP phone calls, turn on the microphones in your computers and listen to the conversations around your computers. They can also view everything on your computer hard drive. Your most secure source for TV is through the Satellite or Dish networks. VoIP is inherently vulnerable regardless of the provider. Skype is also vulnerable.

NOTE: All of the above eavesdropping and data interception techniques are criminal offenses covered under Public Law 90-351, Title All in Investigations, Chapter 18, USC2510-2520 and most state laws.

Recommendations
  • Be cognizant of all of the above malevolent technologies.
  • Employ as many countermeasures as possible.
  • During sensitive meetings remove all cell phones or purchase cell signal detectors and jammers.
  • Purchase and install acoustic noise generators (white/pink noise transducers) in offices/conference rooms where sensitive meetings take place, and hidden motion activated video cameras which will record and document unauthorized intruders.
  • Periodically employ a high level technical surveillance countermeasures (TSCM) team to conduct “sweeps” in the sensitive areas. Some larger firms utilize “Safe rooms” that provide a high level of voice privacy.