Too often, corporations or individuals hire a technical surveillance countermeasures (TSCM) or “bug detection” service provider only after having a strong suspicion that they are eavesdropping. While it may seem like a logical approach to check your suspicions first, the option to delay can be an irresponsible and costly choice. Every minute that an illegal spy maintains access to your information is valuable to the spy and costly to you. The longer you wait, the more opportunities for the intruder to collect enough competitive, proprietary, or harmful personal information to cause your business, or you, irreparable harm.

Why do corporations and / or executives hesitate to quickly hire a TSCM / Bug Sweep provider?? Fear is a key reason executives delay hiring a professional TSCM service provider. It could be the fear that competitors or employees will acknowledge that the company, or its executives, suspect they are vulnerable to illegal espionage. Simply recognizing that the company or its executives are exposed and / or having to obtain the authorization of the owners, members of the Board, etc. it can be difficult. The need to obtain approval from corporate advisers and / or financial decision makers is another key reason for the delay. And, executives who make the decision to proceed with a Bug Sweep can also be discredited as paranoid by their co-workers. Who wants their co-workers to think they are paranoid? But no matter what the motivation is for delaying a decision, the perceived vulnerability will not “just go away.” And the lack of swift and decisive action may be the beginning of the end for the corporation and / or executives. Are you responsible for giving up taking action because you fear the ramifications? If in fact your company or its executives are the victims of eavesdropping, it is negligent to allow the exposure to continue.

Is this a dramatic statement? What if the illegal spy placed an audio listening device in the offices of the Director of Sales and the Director of Accounting? Every word spoken in these two offices, whether by two or more people or while these executives are making corporate or personal phone calls, can be heard and / or recorded by the snooper. If the batteries in a small voice-activated listening device run for two weeks or more, how much valuable information could the intruder steal? The snooper could learn the names of existing customers, prospects, vendors, financial information, pricing strategies, collections information, confidential product order specifications, marketing plans, etc. How much valuable information is shared in the offices of these two directors alone in a span of two weeks? For an illegal spy, it is a gold mine! And, if you work in a highly competitive industry or manage valuable or highly regulated technology, the ramifications can escalate dramatically. Now consider that the illegal spy may have hacked into the executives ’email accounts and / or installed key loggers on the executives’ computers. There is the possibility of simply devastating results! And, if these executives handle confidential or proprietary customer information that they are required to keep confidential (i.e. through a Confidentiality Agreement), or if they handle information subject to strict government control (i.e. ammunition list products , other highly regulated industries / products, technology patents pending, etc.) has a duty and obligation to ensure that your corporate information is not shared with restricted companies, countries and / or individuals.

Isn’t wiretapping a federal crime? Yes! 18 USC Sec. 2512 establishes that the manufacture, distribution, possession and advertising of devices for interception of cable, oral or electronic communications is prohibited. And it does not matter if the illegal spying activity is perpetrated on a company, an executive, an inventor or an individual. Everything is illegal. Unfortunately, the likelihood that an intruder can be effectively identified and prosecuted may be less than you think.

What do I do if I discover illegal electronic devices? One of the most important things you can do once you suspect you have a microphone is to act as “normal” as possible in the area of ​​interest, so that the spy is not “tipped off.” Next, contact a professional TSCM provider outside of your physical area of ​​interest using a phone that you think does not have microphones. This means contacting the TSCM provider from an area outside of your office, car, or home. A professional spy will focus on the locations / places where he expects you to feel comfortable to discuss the information freely. That means your office, elevator, car, cell phone; purse, wallet, bedroom, etc. They are all microphone targets of choice for a snooper. When you feel comfortable, you will discuss confidential, proprietary, or personal information that is valuable to a snooper. You should also be aware that the intruder can expect a local TSCM company to be called in to take care of their task. Therefore, hiring a TSCM service provider outside of your geographic area, operating covertly, may be your best option. And, you should be aware that if an illegal snooper has your company or executives under electronic audio surveillance, they may also be performing some degree of visual surveillance of your company or executives. Nothing can sound an alarm for an illegal intruder like a truck with the TSCM company logo arriving at your office or home. The best is discreet!

Why not let the snooper know that you are after them?If the intruder suspects that you are aware of the illegal activity, they are likely to remove the spying devices at the first perceived “safe” opportunity, particularly if the perpetrator is an employee, part of the cleaning crew, etc. who has routine access to the executive’s office (s) and / or home. Sure, you want the devices removed for surveillance to stop, but your goal should be to know who bothered you, who authorized the detection operation, and / or what potential harm they can do with the information they have taken. The best case scenario would be for the illegal spies to be prosecuted, but the chances of this happening are less than you think. Damage control is most important to any business or individual that has been the target of an eavesdropping attack. That should be your focus!

What Motivates an Illegal Spy?It really is a matter of how valuable your information is! An illegal spy is a risk taker who is willing to risk discovery when the devices are installed and / or after their detection operation is in progress. Your goal is to gain access to the right kind of information and steal as much valuable information as possible. They are your adversary and will do whatever it takes to win. The more damaging the information, the more useful it will be to the illegal spy and / or the company or person who hired them to put you under surveillance.

Why hire a professional TSCM supplier? When you start pricing your professional bug-sweeping allowance, you might be surprised at the cost. It is not a minor expense, but it is a very necessary expense. Buying bargains for a professional TSCM bug sweep is not the best approach. With a bug sweep from TSCM, you get what you pay for! Don’t be fooled by a private investigator giving you a low quote; It’s not the bargain you think it is. A TSCM Bug Sweep performed by a competent, knowledgeable, skilled, and well-equipped TSCM professional is what you need. Most have decades of experience developing their interviewing, visual inspection, and electronic detection skills, and are familiar with the newest and most common emerging threats and appropriate detection methods. They live and breathe TSCM and their opponent is the illegal spy. Private investigators have their talents and skills, and with the exception of a few, TSCM is not usually their area of ​​expertise. Hire a professional TSCM debugging provider!

Leave a Reply

Your email address will not be published. Required fields are marked *