Bug Sweep
Technical Surveillance Counter Measure (TSCM) services
Do you suspect you’re being watched? Has your home or business been compromised? Are you a potential victim of corporate espionage? Then contact us to do a bug sweep using the latest and best technologies. Don’t take your chances with just any Technical Surveillance Counter Measure (TSCM) company. Our team of counter-surveillance specialists has over 25 years of experience conducting bug sweeps for government agencies and Fortune 500 companies. Our field personnel utilizes the latest cutting-edge technology and state-of-the-art techniques to uncover clandestine devices that other (TSCM) companies may not be able to find.
*Are YOU being watched?
To get started, please fill out our confidential TSCM Bug Sweep Services intake form and an investigator will contact you within 24 business hours. If you believe your home or office computer may have been compromised, then please fill out this form on a different computer. For emergency services, please call us Toll-Free at 888-775-4779 after submitting this form. Please note: You should only contact us from a telephone outside of the potentially compromised location! DO NOT call from your office or home. If you are going to use a cell phone, please make sure you call us from a secure location.
We are licensed California Private Investigators: #PI10194
Bug (verb) – 1. conceal a miniature video, audio, recording, or tracking device in (a room or telephone) in order to monitor or record someone’s conversations.
Anyone can be the target of Covert Eavesdropping, however; some people are at greater risk than others because of financial position, occupation, legal, or domestic situation.
- Spouses bug each other on a regular basis
- Parents bug children
- Businessmen bug other businessmen
- Scientists bug other scientists
- Students bug professors
- Attorneys bug other attorneys (and their clients)
- Insurance companies bug accident victims
- Construction companies bug other construction companies
- Salesmen bug clients
- Collection agencies bug debtors
- Police officers bug suspects
- Executive recruiters bug personnel directors
- Rock fans bug rock musicians
- Department stores bug customers and merchandise
We are licensed California Private Investigators: #PI10194
TSCM includes all countermeasures employed to prevent or detect the interception of sensitive, classified, or private information. TSCM is typically an inspection by a technician or engineer of a physical item or place (briefcase, automobile, office, home, boat, etc). The purpose is to locate possible covert surveillance devices (bugs), technical security weaknesses, and technical security hazards. A TSCM specialist will also evaluate for weaknesses in all locks, alarms, and other systems of physical and electronic security or controls.
ELECTRONIC SURVEILLANCE COUNTERMEASURES
Countermeasure searches are systematic procedures designed to locate and neutralize audio surveillance devices or attempt at audio penetration. The search is divided into five phases:
ELECTROMAGNETIC RADIO FREQUENCY SPECTRUM SWEEP
This procedure consists of an analysis of radio frequency emissions for the detection of concealed “active” radiant radio transmitters that may have been “ planted” within a target area.
TELECOMMUNICATIONS DIAGNOSIS
For the eavesdropper to successfully facilitate a practical illicit intervention and subsequent monitoring of telecommunications traffic, a bypass, removal, alteration, and/or modification of the standard system has to occur. This procedure consists of an electronic analysis for the detection of a possible penetration.
WIRE LINK INSPECTION
All electrical receptacles are opened and examined visually, electronically, electro-magnetically, and with a carrier-current receiver for the detection of devices.
AUDIO LEAKAGE EVALUATION
This determines if a conversation taking place within a target area can be overheard.
PHYSICAL INSPECTION
A physical inspection is conducted for the express purpose of locating hardwire microphones and all “passive” devices in an inactive mode.
REPORTS
Upon completion of the search, an oral report is provided with an overview of the hazards encountered. This is followed within 15 working days by a comprehensive written report with photographs of hazards (where found) and recommendations.
We are licensed California Private Investigators: #PI10194
Do you feel that your home has been compromised, or that someone has been eavesdropping on you?
We recommend a survey of your residence, known as a bug sweep. There is great value in an inspection that highlights potential problems. For example, if an easily intercepted cordless phone is being used, the recommendation is that it be placed with a spread spectrum model that cannot easily be monitored.
Two technicians can complete this type of sweep in about four hours. The first part of the sweep is spent looking for radio and video signals. Then, they open and examine the telephones and trace the wiring. The physical inspection is concentrated in the living area. When the inspection is completed the homeowner is debriefed. Our discussions with the homeowner include information on a broad range of security issues as appropriate. Common items include physical security, shredders, analog cell phones, and safe storage of handguns and how to identify possible surveillance of the residence.
During an inspection of residential answering machines, we explain how they may be used to eavesdrop on conversations. In one recent inspection, we showed how the answering machine would intercept conversations. Someone questioned the housekeeper about the family schedule. This was followed by a break-in where nothing was taken. After the break-in, conversations with the residents were repeated at work. While we were explaining the procedure the homeowner recognized the letters “RM” on the display indicating that the machine was in remote monitor mode. The homeowner said, “I have seen that before!”
In a different residential survey, we found an answering machine problem with a fax machine. The all-purpose device was being used to monitor our client’s home office.
Telephone lines are traced and tested from the instruments to the telephone interface block generally located at the exterior of the residence. In one survey this unsecured interface block was inspected and a radio transmitter was found. In several others, we have found “cross-over” wiring, which facilitated an ongoing line transmission of signals outside the residence.
If specific issues are being investigated, a more in-depth home inspection is performed.
Which location is most vulnerable to corporate secrets?
The answer is the executive residence. In our experience, this is the corporate soft spot. FM cordless phones, analog phone lines, answering machines, baby monitors, etc. combine to create the problem.
We recommend a survey of an executive residence in conjunction with the corporate office “post sweep." There is great value in an inspection that highlights potential problems. For example, if an easily intercepted cordless phone is being used, the recommendation is that it be placed with a spread spectrum model that cannot easily be monitored.
One of our corporate clients had an innovative solution to the analog cordless phone problem. They purchased a dozen secure, digital, cordless, spread spectrum telephones that were given to executives to replace their non-secure analog cordless telephones.
Two technicians can complete this type of sweep in about 4 hours. The first part of the sweep is spent looking for radio and video signals. Then, they open and examine the telephones and trace the wiring. The physical inspection is concentrated in the living area. When the inspection is completed the homeowner or his representative is debriefed. Our discussions with the homeowner include information on a broad range of security issues as appropriate. Common items include physical security, shredders, analog cell phones, and safe storage of handguns and how to identify possible surveillance of the residence.
During an inspection of residential answering machines, we explain how they may be used to eavesdrop on conversations. In one recent inspection, we showed how the answering machine would intercept conversations. Someone questioned the housekeeper about the family schedule. This was followed by a break-in where nothing was taken. After the break-in, conversations with the residents were repeated at work. While we were explaining the procedure the homeowner recognized the letters “RM” on the display indicating that the machine was in remote monitor mode. The homeowner said, “I have seen that before!”
In a different residential survey, we found an answering machine problem with a fax machine. The all-purpose device was being used to monitor our client’s home office.
Telephone lines are traced and tested from the instruments to the telephone interface block generally located at the exterior of the residence. In one survey this unsecured interface block was inspected and a radio transmitter was found. In several others, we have found “cross-over” wiring, which facilitated an ongoing line transmission of signals outside the residence.
If specific issues are being investigated, a more in-depth home inspection is performed.
We are licensed California Private Investigators: #PI10194
Others know your confidential business or professional trade secrets.
This is the most common indicator, theft of confidential information is a multi-billion dollar industry in the United States. Often the loss of your secrets will show up in very subtle ways.
Secret meetings and bids seem to be less than secret.
Confidential meetings and bids are very popular targets for corporate spies. How would you like the plans for the corporate takeovers your planning to become public knowledge? Would copies of your product designs be of any use to your competitors?
People seem to know your activities when they shouldn’t.
You have noticed strange sounds or volume changes on your phone lines.
Commonly caused by an amateur eavesdropper when they attach the actual wiretap or similar listening device. Surveillance devices often cause slight anomalies on the telephone line.
You have noticed static, popping, or scratching on your phone lines.
This is caused by the capacitive discharge which occurs when two conductors are connected together (such as a bug or wiretap on a phone line). This is also a sign that an amateur eavesdropper or poorly trained spy is playing with your phone lines.
You can hear sounds coming from your phone's handset when it’s hung up.
Typically caused by a hook switch bypass, which turns the telephone receiver into an eavesdropping microphone (and also a speaker). There is probably somebody listening to everything you say or do within twenty feet of the telephone (if this is happening).
Your phone often rings and nobody is there, or a very faint tone or high-pitched squeal and a beep is heard.
This is a key indicator of a slave device, or line extender being used on your phone line. This is also a key indicator of a harmonica bug, or infinity transmitter being used.
Your radio has suddenly developed strange interference.
Many amateur eavesdropping devices use frequencies within the FM radio band, these signals tend to “quiet” an FM radio in the vicinity of the bug. Look for the transmissions at the far ends of the FM radio band, and at any quiet area along the FM band. If the radio begins to squeal then slowly move it around the room until the sound becomes very high pitched to locate the bug (this is referred to as feedback detection or loop detection and will often locate the bug). The “Stereo” function should be turned off so the radio is operating in “Mono” as this will provide a serious increase in sensitivity.
Your television or radio has suddenly developed strange interference.
Television broadcast frequencies are often used to cloak an eavesdropping signal, but such a device also tends to interfere with television reception (usually a UHF channel). Televisions also “suck in” a lot of RF energy and because of this are very sensitive to any nearby transmitters. A small handheld television with a collapsible antenna may be used to sweep a room. Carefully watch for interference around channel numbers 2, 7, 13, 14, 66, 67, and 68 as these frequencies are popular with eavesdroppers.
You have been the victim of a burglary, but nothing was taken.
Professional eavesdroppers often break into a target's home or office, and very rarely leave evidence of the break-in; however, occupants of the premises will often “pick up on something not being right” such as the furniture being moved slightly.
Electrical wall plates appear to have been moved slightly or “jarred”.
One of the most popular locations to hide eavesdropping devices is inside, or behind electrical outlets, switches, and lighting fixtures. This requires that the wall plates be removed. Look for small amounts of debris located on the floor directly below the electrical outlet. Also, watch for slight variations in the color or appearance of the power outlets and/or light switches as these are often swapped out by an eavesdropper.
A dime-sized discoloration suddenly appeared on the wall.
Tell tale sign that a pinhole microphone or video camera has been recently installed.
One of your vendors just gave you any type of electronic device such as a desk radio, alarm clock, lamp small TV, boom box, CD player, and so on.
Many of these “gifts” are actually Trojan horses that contain eavesdropping devices (about 15% of the time).
The Smoke Detector, Clock, Lamp, or Exit Sign in your office or home looks slightly crooked, has a small hole in the surface, or has a quasi-reflective surface.
These items are very popular concealment for covert eavesdropping devices. Often when these devices are installed at a target location they are rarely installed straight. Also watch out for things like this that “just appear”, or when there is a slight change in their appearance.
Certain types of items have “just appeared” in your office or home, but nobody seems to know how they got there.
Typical items to watch for and beware of are: Clocks, Exit Signs, Sprinkler Heads, Radios, and Lamps.
White dry-wall dust or debris is noticed on the floor next to the wall.
A sign that a pinhole microphone or video camera may have been installed nearby. It will appear as if someone has dropped a small amount of powdered sugar either on the floor or on the wall.
Small pieces of ceiling tiles, or “grit” is noticed on the floor, or on the surface area of your desk.
A prime indicator is that a ceiling tile has been moved around and that someone may have installed a hidden video camera or other eavesdropping device in your office or near your desk. Also, watch for cracks in the ceiling tiles and amateur spies always tend to crack or damage acoustical tiles.
You notice that “Phone Company” trucks and utilities workers are spending a lot of time near your home or office doing repair work.
Telephone, cable, plumbing, or air conditioning repair people show up to do work when no one called them.
A very common ruse that eavesdroppers use to get into a facility is to fake a utility outage, and then show up to fix the problem. While they are fixing “the problem” they are also installing eavesdropping devices.
Service or delivery trucks are often parked nearby with nobody in them.
These vehicles are commonly used as listening posts, be very cautious of any vehicle which has a ladder or pipe rack on the roof. Also, be wary of any vehicle which has tinted windows, or an area that you cannot see through (like a service van). The listening post vehicle could be any vehicle from a small Geo Tracker, Suburban, Blazer, Trooper, or Cargo Van. Look for any vehicle which could conceal a person in the back or has tinted windows.
Your door locks suddenly don’t “feel right”, they suddenly start to get “sticky”, or they completely fail.
Prime evidence that the lock has been picked, manipulated, or bypassed. Always use Biaxial locks with sidebars (such as ASSA or Medeco). Also, only use double-sided deadbolts on all doors. Use good quality window bars on all windows, and a good quality door bar on all doors not used as primary entry doors.
The furniture has been moved slightly, and no one knows why.
A very popular location for the installation of eavesdropping devices is either behind or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs and the position of lamp shades. Also, watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.
Things “seem” to have been rummaged through, but nothing is missing (at least that you noticed).
A “less than professional spy” will often rummage through a target's home for hours, but very rarely will they do it in a neat and orderly fashion. The most common “rummaging” targets are the backs of desk drawers, the bottom of file cabinets, closets, and dresser drawers.
We are licensed California Private Investigators: #PI10194
According to the FBI the following types of businesses are under EXTREME risk and are very common targets of illegal bugging, wiretapping, and surveillance:
Materials:
- Materials synthesis and processing
- Electronic and photonic materials
- Ceramics
- Composites
- High-performance metals and alloys
Manufacturing:
- Flexible computer-integrated manufacturing
- Intelligence processing equipment
- Micro- and nanofabrication
- Systems management technologies
Information and communications:
- Software
- Micro and optoelectronics
- High-performance computing and networking
- High-definition imaging and displays
- Sensors and signal processing
- Data storage and peripherals
- Computer simulation and modeling
Biotechnology and life sciences:
- Applied molecular biology
- Computational Chemistry
- Medical technology
Transportation:
- Aeronautics
- Surface transportation technologies
High Threat Personal Situations
You (or someone close to you) have been:
- Involved in any type of litigation or lawsuit
- Have been questioned, arrested, or arraigned by the police
- In the process of getting married, divorced, or separated
- A minister or religious leader (ie: priest, rabbi, deacon, bishop, elder, etc.)
- Running for any type of elected public office
- Elected to any public office (ie: mayor, selectman, school principal)
- Executive or scientist at any large company
- Recently filed an insurance claim
- Engaging in political demonstrations or activism
- Employed by a defense contractor, Department of Energy, etc…
- Private Investigators have been “poking” around
- You are in the upper-income bracket
Keep in mind that anybody with money, power, influence or access to sensitive, classified, or personal information is at serious personal risk.
High-Threat Business Situations
- Your company has stock that is publicly traded (or will be soon)
- Your company is having labor problems, union activities, or negotiations
- Your company is involved in any type of litigation or lawsuit
- Your company has layoffs pending (or they have just happened)
- Your company is involved in the fashion, automotive, advertising, or marketing industry
High Threat Occupations
- Attorney
- Doctor
- Chiropractor
- Dentist
- Architect
- Police Officer
- Court Clerk
- Judge
- Elected to any public office
- Mayor
- Selectman
- School Principal
- College Professor
- Product Engineer
- Software Developer
- Executive at any large company
- Scientist at any large company
- Employed by any defense contractor
- Employed by the Department of Energy
- Any minister or religious leader (ie: deacon, bishop, elder…)
- Corporate Buyer or Purchasing Agent
- Scientists bug other scientists
- Employee of a Construction Contractor
- Any type Sales or Marketing
- Labor or Union Official
- Fashion
- Advertising
- Personnel Directors
Corporate Information At Risk
These are common locations where your company’s infomation is at risk the most:
- Executive offices
- Boardroom conferences
- Mergers, acquisitions & investments
- Marketing & budget policies
- Competitive takeovers
- Financial & tax matters
- Research data & management plans
- Contract details
- Legal matters
- Off site executive meetings
- Executive residences
We are often asked, “How long will it take to do a sweep?” It depends on many variables: the type of structure, the proximity of the rooms, the number of rooms, the type and number of telephones, and other factors. “Sweeps” of government facilities may take days because of complexities and utilization of “exotic” devices available to the government.
Some non-professional countermeasures technicians, when sweeping commercial facilities, walk around the rooms with a little black box with flashing red lights and an oscillating signal and (with a straight face) tell you that the room is “clean.”
Peter Wright, a retired Senior British Intelligence Office describes in his book “Spycatcher” how, in 1956, he assisted the planning of “Operation Dew Worm” by the Counterespionage Department of the Royal Canadian Mounted Police (RCMP). The Russian embassy in Ottawa had recently burned and was in the process of rebuilding. The RCMP decided to utilize wired microphones to bug the embassy. When skillfully installed, they are almost impossible to detect.
After the Russians had re-occupied the embassy, the RCMP heard sounds coming from the microphones. Later they suspected the telltale sounds of a Russian Technical Surveillance Countermeasure (TSCM) team in operation. However, they were assured that the Russians had instituted a “search” when they heard tapping at the walls for signs of hollowness and the running of metal detectors across the ceilings.
For twenty days the Russians “swept” the rooms containing the microphones as if they knew that the rooms had been “bugged.” However, the Russians found neither the microphones nor the hard wires attached.
Eight years later, the Russian TSCM team returned and went directly to the rooms “bugged” and within an hour had located all the microphones and hard wire. They searched only in the six rooms where the microphones had been planted. Mr. Wright concludes: “They must have known where to look!” Knowing where to look, what to look for, and using the proper equipment is the key. Within the commercial area, where electronic eavesdropping is most prevalent, the technician that works alone and uses one or two pieces of equipment and is in and out in an hour or so is not doing his job!
On the other hand, the technician who spends his time looking for sophisticated devices costing hundreds of thousands of dollars and utilized by the government against the government is wasting the commercial client’s time and money.
We are licensed California Private Investigators: #PI10194
What to do once we found the bug?
“It looks like we found something!” “What do we do next?” Let’s go through the proper procedure step by step. First, don’t say or do anything to alert the eavesdropper that we may be on to his operation. Never, assume that there is only one device? The “silent search” must continue. After it has been determined that all devices have been located, a decision must be made by the client. We suggest three choices:
- Leave the device in place and feed it false information.
- Disable the device in an attempt to lure the eavesdropper to return to repair it.
- Remove it.
If the client decides to call in law enforcement, the device cannot be disturbed and the area must be continuously secured as a “crime scene” until law enforcement and/or telephone company security arrives to take over the scene and initiate their investigation.
Before anything happens, the devices and the surrounding area must be searched and photographed by the TSCM (Technical Surveillance Countermeasure) team. The possibility of the device being “booby trapped” cannot be dismissed lightly. Intelligence agencies and some professional eavesdroppers have been known to use plastic explosives to destroy the device as it is removed so it cannot be analyzed.
If the device is powered by 110 volts, it must be assumed that all conversation taking place in the target area since the last TSCM search has been compromised. If the device was powered by a battery and it is dead, the same assumption must be made.
If the device is a battery-operated-live-transmitter, a fairly accurate estimate can be made as to how long the device has been operating and how long it will continue to operate.
The client must be interviewed concerning: What has happened or what is about to happen in the area where the device was found? Who has had access to the area? Consider where the device was placed and how long it would take to make the installation. What is the level of building security and who would have a motive? Could an “insider” have knowingly or unknowingly made the installation?
The sophistication of a device/s may give an indication as to the proficiency of the eavesdropper. A sloppy homemade Radio Shack device would indicate an amateur. A well-made, mass produced commercial device could indicate a semi-professional or a government installation. An exotic, expensive or custom-made unit indicates that we are dealing with a cunning professional eavesdropper.
We should next consider the probable range of the device, the frequency, power output and location in the room. With all this information we still face a most difficult task in an attempt to locate the listening post, plus a difficult task of learning the identity of the eavesdropper and his client.
We are licensed California Private Investigators: #PI10194
A partial list of equipment that is used during TSCM inspection:
- [1] Eagle Scanning Radio Receivers with Integrated Data Computer System (IDCS) 10 KHz to 2 GHz.
- [2] Scanlocks ECM, an automatic tuning receiver to detect, identify the frequency, and locate low-power conventional transmitters operating between 8KHz and 4 GHz.
- ICOM R8500, a wide band coverage receiver covering the radio spectrum from 10 kHz to 3.7 GHZ, with external extender, AM/FM wideband – SSB, with Automatic Gain Control (AGC) – built-in spectrum analyzer and preamplifier.
- [2] ICOM 7000, wide band coverage receivers covering the radio spectrum from 30 KHz to 3.7 GHz, with an external extender, AM/FM wideband – SSB, with Automatic Gain Control (AGC).
- ICOM 72-A, a wide band coverage receiver covering the low end of the radio spectrum from 10 KHz to 30 MHz, AM/FM – CW – SSB and AGC, and a preamplifier.
- [2] Memorex Television Monitors, Model 17, are connected to the TV output on the ICOM 8500 or ICOM 7000 to identify and clandestine wireless television signals.
- Avcom SDM–42- provides a 10.7 MHz IF display on all search receivers.
- [2] RF Signal Monitors SM-1 and SM-2 used w/ the Eagle Receiver
- E 4407 B Agilent Technologies Spectrum Analyzer is a high-performance, compact portable spectrum analyzer that displays absolute amplitude and frequency information of signal within the frequency spectrum of 9 KHz to 26.4 GHz with an internal coaxial mixer.
- SA 5 Spectrum Analyzer 50 KHz to 2 GHz
- [2] Oscillators: produces a variable, amplified RF signal to activate a dormant microphone.
- [1] Carrier Current Receiver CCR-3
- Desktop Computers and Laptops
- Microwave Detector, #3052 An LED flashes, and an audible click with be heard in the presence of a microwave frequency between 800 MHz to 2,500 MHz.
- Electroviewer IR 2715 is an infrared high-resolution device for observing radiation in the electromagnetic spectrum.
- [3] Electronic Telephone Analyzers are used in evaluating telephone instruments' wiring and connecting cables to determine if the instrument has been compromised. [2] TSA-1 [1] ETA-1
- Tektronix 1503B Time Domain Reflectometer (TDR) is a scope unit that can best be expressed as radar for wires. It puts out a short-duration electronic pulse that is zapped down the wire under test. It then gives a waveform of the reflections of this pulse, which is charted for future reference.
- 3M Dynatle 965-A DSP Series Subscriber Loop Analyzer w/ TDR capabilities.
- Line Impedance (ISA) Load Detector.
We are licensed California Private Investigators: #PI10194
TSCM (Technical Surveillance Countermeasures)
The Threat – Illegal Eavesdropping in the United States
The manufacture, sale, installation, and monitoring of illegal surveillance devices is a multi-billion underground industry within the United States.
The U.S. State Department estimates that at least 800 million dollars of illegal bugging and eavesdropping equipment is imported and installed into corporations in the United States each year.
The majority of this equipment is illegally imported into the United States from France, Germany, Lebanon, Italy, Canada, Israel, England, Japan, Taiwan, South Africa, and a host of other countries.
Additionally, anyone with a soldering iron and a basic understanding of electronics can build and install an eavesdropping device. The raw materials to build such a device may be easily obtained at Radio Shack or salvaged from consumer electronic devices such as cordless telephones, intercom systems, and televisions.
In the United States, over six million dollars worth of surveillance devices is sold to the public each day. Most of these products are sold by storefront operations, spy shops, attorneys, and via private investigators located in major metro areas such as New York, Miami, Los Angles, San Francisco, Dallas, Chicago, and Minneapolis. This does not include the tens of billions spent each year on legitimate eavesdropping products purchased by law enforcement, military, and intelligence agencies.
This equipment is commonly sold over the counter, via mail order, and through the Internet. Most of these bugging devices cost only a few dollars, but highly sophisticated, quality products may be purchased for less than one thousand dollars.
In New York City alone there are over 85 companies that will not only sell you the eavesdropping device but will break into the target's office to install the device, and for an additional fee will provide a monitoring and transcription service.
The FBI and other federal law enforcement agencies have repeatedly indicated that they lack the resources and training to enforce or properly investigate the technical security threat within the United States.
Technical surveillance and industrial espionage are serious problems that can have a VERY GRAVE IMPACT on your company and your own personal freedoms.
We are licensed California Private Investigators: #PI10194
Sometime ago Popular Science magazine contained an article entitled, “Spies in the Xerox Machine”. It is regrettable that the author felt compelled to reveal this information on the method used as industrial espionage practitioners might otherwise never become aware of it.
In 1962 when the cold war was in full swing the CIA realized that the one person who had easy and regular access to the Soviet Embassy in Washington DC was the Xerox repairman. The agency went to Xerox and asked them to build a device that would copy each document passed through the copy machine. Xerox brought together several of its top engineers. Because of the secret nature of the project they rented an abandoned building in a shopping center to establish an impromptu research lab.
After months of search the engineers came up with a promising solution: Mount a battery-powered 8mm home movie camera with a zoom lens inside the copier and aim the lens at the mirror used to reflect images onto the drum. Then add a photocell that would trigger the camera to snap one still frame whenever the photocopier lit up. The camera’s noise was drowned out by the sound of the copier.
After several successful experiments, the team installed their “bugged” copy machine in the main Xerox office. When they developed the film they found a variety of pictures, recipes, music scores, cartoons, jokes, etc.
In this early version, the movie camera and film would have to be replaced periodically by someone with access to the internal mechanism of the machine.
In 1969 a chemical company came up with a similar idea for spying on a competitor but was caught red-handed.
With today’s technology, a miniature video camera and a wireless transmitter on a high frequency, i.e., between 1800 MHz to 2500 MHz is virtually undetected as it is out of the range of most radio receivers. The interception of the data is almost instant as there is no waiting for the retrieval and processing of film.
When the TSCM team is conducting their search they should be instructed to inspect and test the copy machine for the radiation of R.F. signals that might be the transmission of images.
Copy machines may not be located in or near sensitive areas in a facility but sensitive materials may be carried to them.
This is an important factor in a TSCM sweep and should be discussed in the report.
We are licensed California Private Investigators: #PI10194
A company will often have an off-site meeting with executives so they can concentrate on a specific agenda away from the daily routine. These meetings usually are held at a hotel, resort, or convention center. Frequently, the program is a combined effort between the company, a meeting/event planner, and the hotel convention staff. Security is often lax when a meeting is held at a commercial establishment. Their primary goal is to create a pleasant environment for the attendees. Security issues are not their primary concern.
An off-site meeting is an excellent opportunity for an industrial spy to gather intelligence by determining the location of the meeting rooms, the agenda, the speakers, the topics to be discussed, and the decisions made. This is the information that he/she needs to provide to their client.
As the company is planning the event, so is the industrial spy. A reservation clerk may provide a list of attendees and their room numbers. After each session, the janitor may pick up all the papers on the tables along with waste paper from the meeting rooms. While serving refreshment s a waiter may hide a transmitter under a table. A hotel security officer off duty talks in the bar next door about any or the lack of any special security arrangements.
The eavesdropper may have attended previous meetings in the hotel to examine radio signals coming from the public address system in each of the meeting rooms. Using his monitoring equipment he is aware of the best locations in the hotel to set up his listening post if he must install a bug. He may have compiled a list of which floors get the best radio signals for each piece of equipment he intends to use. It is an opportunity to eavesdrop using the hotel’s or the event production crew’s wireless public address system. This is a “freebie."
To secure an off-site meeting from an eavesdropper, the company should engage the services of a professional technical surveillance countermeasures (TSCM) team in the early planning stages to coordinate security efforts with the company, hotel staff, and the event planner. Several hours before the meeting is scheduled the TSCM team should perform a physical sweep of the meeting rooms and/or any breakout rooms that will be used. They would establish a “monitoring post” (MP) in a nearby room, service corridor, or outside the building in a specially equipped van. They must be close enough to hear an extremely low-powered device (a test transmitter under 10 milliwatts) from the podium. It is critical that the monitoring site is closed.
The TSCM team only hears what is being presented in the meeting when a device is activated and broadcasts the signal outside the meeting. At a recent meeting where highly proprietary was going to be discussed, the hotel’s audio/video technician stated that his wireless microphones would not broadcast much beyond the parking lot.
And then there is the problem of cellular telephones carried into the meeting…
We are licensed California Private Investigators: #PI10194
What is a bug?
In discussing “bugs” the vision that comes to mind is of a miniature transmitter placed behind a picture frame, in a potted plant, on a desk, or perhaps a floor lamp. But have you ever really considered what a “bug” is or how they operate and what frequencies they operate on?
In most instances, a “bug” is a transmitting device. They usually consist of a microphone, an audio amplifier circuit, a radio frequency circuit, an antenna, and a power supply. The size will depend on the application, ranging from the size of a pack of cigarettes to as small as a pencil eraser. Most are commonly about the size of a quarter including the battery.
As for the range in frequencies, the bug can be built to operate anywhere from below the standard AM broadcast radio band to above the commercial microwave frequencies of 40 GHz. The biggest threat is from those operating from approximately 70 MHz to about 300 MHz, simply because it is easier to build them for these frequencies. Generally speaking, these frequencies use less power to operate. The antennas are shorter, component selection is less critical and a better transmitting range is realized.
One of the things most often asked is, “Where is the greatest threat when looking for a bug?” The largest percentage of devices found in the “amateur spy band” of approximately 70 MHz to 130 MHz.Why? Simply, more devices are constructed and available which work in these particular ranges. It takes no sophistication and very little money to construct these transmitters. Kits can be bought for $30.00 and up and contain about $5.00 worth of parts. They can be constructed in as little time as a couple of hours (taking time out for a coffee break) and can transmit a signal in excess of a mile. A little more sophisticated are those devices in the 150 MHz to 300 MHz range, only because more care must be taken in construction, but they are equally as effective.
Most signals encountered will be clear text types, either AM or FM. Where we start running into problems is when the intelligence on the signal is “manipulated.” This comes about by the various means of modulating a signal, such as transmitting an AM carrier with an FM sub-carrier, or an FM signal with an AM sub-carrier. Another step up the line is the pulse position or pulse amplitude method of modulation. Top of the line is generally considered to be “spread spectrum signals” where the signal is spread over a very wide frequency range versus a narrow frequency range for other signals.
The “bugs” sensitivity and transmitting range will be proportional to their size and smaller “bugs” will have a limited range. Eavesdroppers have been known to employ relay transmitters that will receive a weak signal from the target area and automatically transmits this signal to a more distant point. A sophisticated approach to bugging is the remote-controlled “bug” that is used in foil detection and conserves battery life.
If you have any indication that a “bug” has been planted in your area of responsibility, you should contact a reputable countermeasure firm as they have the technical equipment to solve the problem.