I Think I Am Under Surveillance
Eavesdropping devices are more prevalent than ever before
In the age of technology that we all live in, eavesdropping devices are now cheap, accessible and easy to operate. Many of these devices can work on a 3G or 4G network and can be used on a throwaway basis. The device may be planted left to operate and then discarded once the power source is drained.
More complex devices may tap into the main power supply. These can operate undetected for months or even years. This type of device can tap power from a light, plug socket, or even a piece of hardware, computer or machine. As the power source is a openly seen power source or known electrical device, these devices are often overlooked by low-level search tactics.
We have also seen the more recent and higher-level burst signal devices. These will record to an internal drive for hours. Then the device emits a very short transmission of all the data it has gathered over the period which is usually 4, 6 or 8 hours. Some of these audio bugs will use a spectrum inversion, meaning that every signal is split into millions of tiny pieces of audio which is then decrypted by a specific type of receiver. This helps in evading detection as they are not continuously transmitting, they will not always surface on transmitter sweeps.
​
As we are all surrounded by electronic devices, and transmissions of all types, the possibilities of falling victim of eavesdropping devices is now greater than ever before.
​
​
The financial industry has always been a main target and we have dealt with numerous financial corporates over the years. Many of our long-standing clientele have regular sweeps conducted 2, 3 or 4 times every year. We know that having a clean bill from a reliable countermeasures expert not only reduces the risk of information leakage but also offers peace of mind for new and existing clientele. Should the question come up our clients pass on to their own clients that the risk of an information leak is minimal.
There are many reasons corporations or companies have the need for TSCM / bug sweeping services. It may be due to a recent breach of information. A recent leaver who is suspect in a data breach, it may be to comply with obligations or simply to sustain confidence with clientele and staff members.
What Should I look for?
Objects in the home have been moved or damaged
If you suspect some of your personal items may have been moved, misplaced or damaged this may be a sign someone has entered your home without permission. And, with end goals in mind, devices could have been hidden or planted within your home or business
New gifts from “suspects”
As we have said, audio bugs and spy cameras can be placed in almost anything. The snooper may well give you or a family member, or work colleague, a gift, such as a desk ornament, plant, or toy with the aim of having it placed in a place where eavesdropping can be accomplished.
Equipment appears tampered
If you see evidence that equipment has been opened, replaced or tampered with, it may be a sign of something being added. Often you will be able to notice small indications that phones, televisions, or plug sockets may have been opened. Small scratch marks, cracks or missing screws.
PLEASE NOTE: DO NOT EVER TAMPER WITH ELECTRONICS UNLESS YOU HAVE SUFFICIENT KNOWLEDGE TO UNDERTAKE THE TASK.
People Know things you shouldn’t
Again, it’s an obvious sign, but if you feel that other people have knowledge that would only come from listening to conversations in your home or workplace it’s a good sign that there may be someone listening in.
Repairs organized by third parties or unexpected visits from utility company’s
It seems unlikely but, depending on the end goal, some people may take the leap from legality to gain access to your home or business under pretense. They could be installing an eavesdropping device or changing batteries, or servicing an installed device so simply turning them away may not remedy the situation. Always confirm and authenticate any repair workers credentials.
Am I being followed?
If you are noticing a new face appearing at different locations, or a new or unfamiliar vehicle parked or circling your home or workplace you may well be under surveillance. There are some simple steps you can take that may help you in confirming this. Try going to a train station, If possible go to a smaller less populated station. Once you have entered go to the barrier and wait, see if anyone appears to follow you in, try not to make your checks obvious as any surveillance operative who knows their job may simply walk by you, drop the operation ready to fight another day. Things like, searching a bag or be on the phone. Keeping a close eye on who has entered after you for a few minutes. Then leave the same way you came in. make sure you are away from the station's main entrance line of sight, go around a corner, or out of eyeshot from your last location. Again, wait, did anyone follow you in and out? If so, there is a strong possibility you are being followed.
You can also try driving in circles. The idea is the same as above, drive to a location and turn around, take note of any vehicles that appear to be going the same way you are. Again, turn around, see the same vehicle appears to follow.
For more assistance on counter surveillance call one of our experienced countermeasures experts.