Spy

  • Permalink Gallery

    Covert Surveillance and Spy Listening Devices are Rooted Out in Bug Sweeps

Covert Surveillance and Spy Listening Devices are Rooted Out in Bug Sweeps

The other day, I was thinking about all the people who call International Investigators to ask us to install phone tapping equipment or put a mobile phone tap on a cell phone to find out the truth about someone or some situation. We won’t do that because it’s illegal, but there are other ways that are legal to get the information they want – or find out how others are getting information they shouldn’t have.

One thing we often remind clients is that a cell phone is a computer. While someone may be suspicious about the activity on a spouse’s/girlfriend’s/boyfriend’s/co-worker’s phone, the user could simply be playing a game, checking a bank balance, transferring money, or even entering what they ate into an app they’re [...]

  • Permalink Gallery

    Listening Devices Might Not be the Only Threat to Confidential Business Matters

Listening Devices Might Not be the Only Threat to Confidential Business Matters

In one of my recent posts, I talked about how we did a Technical Surveillance Countermeasures (TSCM) sweep for spy listening devices in the offices of a business. We didn’t find any eavesdropping devices in their offices, but we did determine that one of the other businesses in the building was being bugged.

When we conducted the sweep and found nothing, that was a good thing. The business owner knew someone had learned something that was being held confidentially and was concerned. So he took the first logical step in his mind to find out if there were listening devices installed in the areas of the office where sensitive discussions were taking place. Eliminating eavesdropping devices from the options, he could move forward.

Automatically people suspect [...]

Is Your Surge Protector Housing Eavesdropping Devices?

We worked with an attorney who was convinced that his office, phone, or both were bugged. He was in the middle of a case and the “other side” seemed to know every position, jab and parry he had planned and was prepared to counter him in the courtroom. It was just too much of a coincidence. He was convinced there was some sort of phone tapping or covert surveillance going on in his office.

He tried to do some of his own bug detection—looking under his desk, around the windows, pictures and door frames for something, but he found nothing.

So he called us.  We did a bug sweep and lo, and behold, he was correct. Inside the surge protector power strip at his feet we [...]

May 8th, 2012|Bug Sweeps|