We hear that question a lot. There’s a really simple answer. You have information someone else wants. And they know you won’t tell them if they ask, so they figure out a way to get it without asking – they steal it.
The information they want could be many different things found in a wide variety of settings:
- What is being included in a grant application at a competing university;
- What sales strategy is being implemented to move into a new market;
- The development of a new product that would “squash” the competition;
- How a client is being defended in court;
- Whether a spouse is having an affair.
All of these bits of confidential information could have big dollar impact on another person or business, which is why some people would go to extraordinary lengths to get it. Those extraordinary lengths could include:
- Cell phone taps
- Video surveillance
- Eavesdropping devices
In short, it could be more than a cell phone tap. It could be anything that can provide them insight or information covertly.
Sometimes we get calls from professionals who “just feel something isn’t right.” They hear a comment about something that no one else should know or all of a sudden a supplier can’t provide what they need and won’t explain why.
We are hired to provide Technical Surveillance Countermeasures (TSCM) services and that “gut feeling” turns into actual cell phone tapping devices or other spy equipment like video surveillance, eavesdropping devices or computer hacking.
Although we don’t want everyone to feel paranoid, you probably have information that would be valuable to someone else. It might be to your advantage to trust those gut feelings.
If we do a TSCM sweep and find nothing, you will be able to move forward more confidently. If we find something, you may have the time you need to deal with the information leak and protect your assets and interests.
-Brenda McGinley, CEO, All in Investigations, All in Investigations