Countermeasures Debugging Sweep
Hardwire: (Telephone & Telephone Line Search)
A Hardwire bug or transmitter is a listening device that is attached to your phone or phone line. It’s powered normally by the line itself and pulls very low amperage, hence making it hard to detect. A hardwire bug or transmitter can be placed on your phone, telephone line, or telephone system. These eavesdropping bugs can even be placed on your line outside of the building, or down the street at the junction box. If we are dealing with professionals they can even tap into your lines miles away, which is why we check your lines from your address to the local station at the telephone company. Our Time Domain Reflectometry equipment & spectrum analyzer sends signals through the phone line to the central office and back to our system. We are then able to determine if your phones are being tapped from within your office, out of your office, or at the telephone companies central station. If we locate amperage or ohm drain, it normally means a receiver has been picked up or power is being drained from your line. Our computer equipment confirms the data and helps us locate the power drain where we then take the appropriate measures in defeating the eavesdropping equipment.
Radio Frequency: (Spectrum & Audio Search)
RF transmitters send wireless signals throughout the air, and any FM/AM radio or scanner device can then intercept these signals. With today’s technology local spy stores are selling RF transmitters for under a hundred dollars. Today’s corporate market is a spying game with competitors wanting to know each other’s trade secrets and business practices. RF transmitters are as small as normal bugs, however they need power to operate for it’s not normally connected to a hardwire power supply. The battery makes the bug a bit larger and places these bugs can be located are within electrical outlets, under furniture, or any other creative idea one can think of. A physical search helps in locating RF transmitters however the only true way to locate them is by using a RF locater also known as a spectrum analyzer. Cellular telephones, home portable phones, and other equipment send signals throughout the air; we are looking for these types of signals. To perform the search correctly a professional spectrum analyzer needs to be used looking at frequency channels searching the low and high-end frequencies. Our system searches into the low Hz to a very high GHz range, this range is normally kept confidential due to if competitors knew our ability it would inadvertently hinder our ability in providing you the very best assurance against eavesdropping equipment. If a signal is picked up we are notified through various means (i.e. audio, vibration, meters…) and can track/pin point where the transmitter is located, (in between walls, above ceiling tiles, under furniture…).
Laser/Infrared bugs
These types of listening devices are difficult to use and usually require a person to operate the equipment through a window or similar opening. With RF transmitters dropping in price an operative could easily setup the equipment via tripod connected to a transmitter and intercept your communication from miles away. A laser or infrared beam is shot into the room where observation wants to take place. The audio in that room is picked up by the laser beam and transferred into data that is then sent over the light or infrared beam back to the sender. The sender normally has a recorder connected to the equipment and can record the conversation. Difficult to use for you need a direct line of sight. Due to the nature of our services and the complexity of today’s business we will search and protect you from these types of eavesdropping equipment as well to include the suggestions of leaving behind equipment that will protect you from laser listening devices in the future.
Physical search
The removal of all electrical outlets, air vents, ceiling tiles, smoke detector covers, light switch covers…etc.
An ever-growing need for security services grew once the events of 9/11 unfolded into our Present Danger. The growth was felt within hours; we had our first influx of business with clients requesting security measures and guard services. Within weeks, they tried to test the American way of life with the “Anthrax Scare”, and we responded with CDC recommended ultra violet sanitizers for mailrooms to protect our clients and respective affiliates. Within months the increase of security was felt with different military branches contacting our offices for services and products; requests for GSA paper shredders, handheld and walkthrough metal detectors…etc. were requested like a Hollywood movie.
Today we deal with terrorist attacks at home, something that once seemed like a movie is now a real threat and danger we need to be prepared for. Risk management, security consulting, and background checks were words used at the waistline; just topics and issues that were not pressed… until the tragedies of 9/11 brought us into our now and ever unfolding
Transition is the key… for we all must adapt and overcome!
Every aspect of your business should be scrutinized with retrospect to the security infrastructure; a strong infrastructure starts with a secure foundation. The Security you provide needs to be intertwined within every facet of your business and not just the common areas, like door locks and alarm codes. We get complacent with security, we lock our front doors and click an alarm to protect our vehicles… but should it end there? Years ago our grandparents would have thought we were crazy for locking our homes not to mention cars. Our way of life has expanded exponentially, hence our security responsibilities have also grown. The future may be more complicated with technology and the many devices we have to choose from… however, if we use them correctly and intelligently we can make them work for us.
Many products are available to bring peace of mind and security into your business and household. Some forms of security include camera systems, shredders, detection devices, access control, encryption, computer network security and security patrols. The key to safe security lies in the ability to choose the most effective equipment solutions. Counter Intelligence Services offers inexpensive consultations as well as affordable security solutions.
Our product line of telephone/facsimile/email encryption, biometric access control, camera systems, mail bomb detection, handheld or walkthrough metal detectors and various other high-end (GSA certified) security systems will increase your protection from competing businesses or terrorist acts.