Tag: technical surveillance countermeasures
-
If You’re Asking, “Is My Office Bugged?” You Need to Talk to
If a bad guy has access to your environment, they can plant a bug. The most common way a bad guy gains access to a home or business is through the “service technician ruse.” It isn’t just in the movies, but in real life, too. He dresses as a service technician and says he is…
-
Listening Devices Might Not be the Only Threat to Confidential Business Matters
In one of my recent posts, I talked about how we did a Technical Surveillance Countermeasures (TSCM) sweep for spy listening devices in the offices of a business. We didn’t find any eavesdropping devices in their offices, but we did determine that one of the other businesses in the building was being bugged. When we…
-
Bug Detection has Evolved, Just Like Planting Bugs Has Changed
Technology has changed just about everything about life, hasn’t it? Well, that pertains to the investigative world, too. In the early 1970s, when did Technical Surveillance and Countermeasures (TSCM) sweeps, we were basically looking for radio room bugs and telephone line taps. Bad guys would generally need to have access to the location to plant…
-
Is Your Surge Protector Housing Eavesdropping Devices?
We worked with an attorney who was convinced that his office, phone, or both were bugged. He was in the middle of a case and the “other side” seemed to know every position, jab and parry he had planned and was prepared to counter him in the courtroom. It was just too much of a…