All in Investigations

Category: TSCM

  • Bug Detection Out of the Office

    Bug Detection Out of the Office

    During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how.…

  • Security Starts with TSCM

    Security Starts with TSCM

    got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the…

  • Unfair Competitive Edge Can be Averted through TSCM Sweep

    Unfair Competitive Edge Can be Averted through TSCM Sweep

    There are so many reasons for electronic surveillance. Just about any situation that includes a competitive element provides the impetus for covert surveillance. Corporate and industrial espionage may be what first comes to mind, but spy listening devices can be used in every industry and field. According to an ESPN article from April, 2012, there…

  • Would a Bug Sweep of your Business Uncover any Spy Equipment?

    Would a Bug Sweep of your Business Uncover any Spy Equipment?

    Just like an average citizen might ask who would want anything from them enough to take the time to engage in cell phone tapping, businesses across the nation might ask who would install eavesdropping devices or engage in electronic surveillance in their organizations. The answer is evident in a report from the National Counterintelligence Executive…

  • Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!

    Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!

    Many companies have Intellectual Property Protection insurance for protection. But insurance is only good after a theft or breach of confidential or proprietary information. Wouldn’t it be a better idea to prevent a loss before it happens? When a business hires to do a bug sweep, or more precisely, TSCM, it’s because they want to…

  • TSCM Ensures a Gift is Sincere, Not an Eavesdropping Device

    TSCM Ensures a Gift is Sincere, Not an Eavesdropping Device

    With the door to technology wide open, some people think the days of phone tapping and other spy listening devices are over. They think that all covert surveillance is computer surveillance or cell phone tapping. Let me be the first to tell you, that’s not true – in the least. The stereotypical covert operation to…

  • Cell Phone Spying is Illegal in the United States

    Cell Phone Spying is Illegal in the United States

    There is one more reason to be glad you reside in the United States – cell phone spyware is illegal here. With the release of the Apple iPhone5 in Australia, cries can be heard about the “potential tsunami of privacy breaches” according to an article at news.com.au. The article quotes senior lecturer of Internet law…

  • Cellular Location Evidence Requires Expert Analysis

    Cellular Location Evidence Requires Expert Analysis

    The use of cellular forensics has become a real tool for many attorneys and their clients – on both the defense and the prosecution sides of the courtroom. Although we conduct mobile device forensics or mobile phone hack detection for clients suspecting cell phone spying, we also conduct investigations using cellphone records and mobile phone…

  • Baby Monitors as Spy Equipment? Don’t Laugh, It’s True

    Baby Monitors as Spy Equipment? Don’t Laugh, It’s True

    Did you ever think that your baby monitor could be a spy listening device? That’s right. With technology moving ahead, parents are able to connect to their baby monitors and while these eavesdropping devices are meant to keep baby safe, the can also end up being used as electronic surveillance by bad guys. How it…

  • Covert Surveillance and Spy Listening Devices are Rooted Out in Bug Sweeps

    Covert Surveillance and Spy Listening Devices are Rooted Out in Bug Sweeps

    The other day, I was thinking about all the people who call to ask us to install phone tapping equipment or put a mobile phone tap on a cell phone to find out the truth about someone or some situation. We won’t do that because it’s illegal, but there are other ways that are legal…