top of page

I Think I Am Under Surveillance

BUG SWEEPS - AM I BEINNG MONITERED

Eavesdropping devices are more prevalent than ever before

 

In the age of technology that we all live in, eavesdropping devices are now cheap, accessible and easy to operate. Many of these devices can work of 3G or 4G and can be used on a one-off basis. The device may be planted left to operate and then discarded once the power source is drained.​

 

More complex devices may tap into the main power supply and burst signal meaning that every 4, 6 or 8 hours the device emits a very short transmission of all the data it has gathered over the period. Only to restart again. This can be a 3G, 4G GSM, or many other transmittable frequencies.

 

As we are all surrounded by electronic devices, and transmissions of all types, the possibilities of falling victim of eavesdropping devices is now greater than ever before.

 

The financial industry has always a been a main target for eavesdropping devices and we have dealt with numerous financial corporates over the years. Many of our long-standing clientele have regular sweeps conducted 2, 3 or 4 times every year. We know that having a clean bill from a reliable countermeasures expert not only reduces the risk of information leakage but also offers peace of mind for new and existing clientele. Should the question come up our clients pass on to their own clientele that the risk of an information leak is always minimal.

 

There are many reasons corporations or companies have the need for TSCM / bug sweeping services. It may be due to a recent breach of information. A recent leaver who is suspect in a data breach, it may be to comply with obligations or simply to sustain confidence with clientele and staff members.

 

What Should I look for?

 

 

Objects in the home have been moved or damaged

 

If you suspect some of your personal items may have been moved, misplaced or damaged this may be a sign someone has entered your home without permission. And, with end goals in mind, devices could have been hidden or planted within your home or business.

 

 

New gifts from “suspects”

 

As we have said, audio bugs and spy cameras can be placed in almost anything. The snooper may well give you or a family member, or work colleague, a gift, such as a desk ornament, plant, or toy with the aim of having it placed in a place where eavesdropping can be accomplished.

 

 

Equipment appears tampered

 

If you see evidence that equipment has been opened, replaced or tampered with, it may be a sign of something being added. Often you will be able to notice small indications that phones, televisions, or plug sockets may have been opened. Small scratch marks, cracks or missing screws.

PLEASE NOTE: DO NOT EVER TAMPER WITH ELECTRONICS UNLESS YOU HAVE SUFFICIENT KNOWLEDGE TO UNDERTAKE THE TASK.

 

 

People know about things you have spoken about

 

Again, it’s an obvious sign, but if you feel that other people have knowledge that would only come from listening to conversations in your home or workplace it’s a good sign that there may be someone listening in.

 

 

Repairs organized by third parties or unexpected visits from utility company’s

 

It seems unlikely but, depending on the end goal, some people may take the leap from legality to gain access to your home or business under pretense. They could be installing an eavesdropping device or changing batteries, or servicing an installed device so simply turning them away may not remedy the situation. Always confirm and authenticate any repair workers credentials.

 

 

Am I being followed?

 

If you are noticing a new face appearing at different locations, or a new or unfamiliar vehicle parked or circling your home or workplace you may well be under surveillance. There are some simple steps you can take that may help you in confirming this. Try going to a train station, If possible, go to a smaller less populated station. Once you have entered go to the barrier and wait, see if anyone appears to follow you in, try not to make your checks obvious as any surveillance operative who knows their job may simply walk by you, drop the operation ready to fight another day. Things like, searching a bag or be on the phone. Keeping a close eye on who has entered after you for a few minutes. Then leave the same way you came in. Make sure you are away from the station's main entrance line of sight, go around a corner, or out of eyeshot from your last location. Again, wait, did anyone follow you in and out? If so, there is a strong possibility you are being followed.

 

You can also try driving in circles. The idea is the same as above, drive to a location and turn around, take note of any vehicles that appear to be going the same way you are. Again, turn around, see if the same vehicle appears to follow you.

For more assistance on counter surveillance call one of our experienced countermeasures experts.

 

 

bottom of page