All in Investigations

Tag: technical surveillance countermeasures

  • If You’re Asking, “Is My Office Bugged?” You Need to Talk to

    If You’re Asking, “Is My Office Bugged?” You Need to Talk to

    If a bad guy has access to your environment, they can plant a bug. The most common way a bad guy gains access to a home or business is through the “service technician ruse.” It isn’t just in the movies, but in real life, too. He dresses as a service technician and says he is…

  • Listening Devices Might Not be the Only Threat to Confidential Business Matters

    Listening Devices Might Not be the Only Threat to Confidential Business Matters

    In one of my recent posts, I talked about how we did a Technical Surveillance Countermeasures (TSCM) sweep for spy listening devices in the offices of a business. We didn’t find any eavesdropping devices in their offices, but we did determine that one of the other businesses in the building was being bugged. When we…

  • Cell Phone Forensics – No Judgment, Just Facts

    Cell Phone Forensics – No Judgment, Just Facts

    We worked with a woman who called from Seattle. We know she contacted us because we are one of only a few investigative labs who can potentially identify the bad guy when we uncover a cell phone spy. What we didn’t know, was that she was concerned about being embarrassed because some of the details…

  • Bug Detection has Evolved, Just Like Planting Bugs Has Changed

    Bug Detection has Evolved, Just Like Planting Bugs Has Changed

    Technology has changed just about everything about life, hasn’t it? Well, that pertains to the investigative world, too. In the early 1970s, when did Technical Surveillance and Countermeasures (TSCM) sweeps, we were basically looking for radio room bugs and telephone line taps. Bad guys would generally need to have access to the location to plant…

  • Is Your Surge Protector Housing Eavesdropping Devices?

    Is Your Surge Protector Housing Eavesdropping Devices?

    We worked with an attorney who was convinced that his office, phone, or both were bugged. He was in the middle of a case and the “other side” seemed to know every position, jab and parry he had planned and was prepared to counter him in the courtroom. It was just too much of a…

  • Why Would Anyone Tap MY Phone?

    Why Would Anyone Tap MY Phone?

    We hear that question a lot. There’s a really simple answer. You have information someone else wants. And they know you won’t tell them if they ask, so they figure out a way to get it without asking – they steal it. The information they want could be many different things found in a wide…