Information theft is a very real threat to business and can be extremely difficult to detect. It can cost companies significant sums of money, wreck deals and acquisitions and cause irreparable reputation damage. Control Risks has extensive experience working with clients to detect the presence of eavesdropping devices and in designing and implementing strategies to prevent leaks.
There are many methods of illicitly obtaining information but few are as effective and as hard to detect as electronic eavesdropping or “bugging”. The pace of technology means that clandestine listening devices are smaller, more sophisticated, more reliable, and provide better sound quality over longer distances. Increasingly, GSM technology (found in mobile phones) is used in listening devices, which allows the device to be covertly placed weeks in advance, lying silent until activated remotely, sending audio and video of meetings or, using GPS, to track the movements of an individual. Conventional technical sweeps have difficulty in detecting these GSM devices, as they are often inactive during a sweep or indistinguishable from genuine GSM signals from mobile phones. Locating these types of listening devices requires high-tech equipment and expertise.
We continually invest in the latest technology and tailor our approach on an individual client basis to ensure that the service we provide is appropriate to the risks associated with the technical threat. A comprehensive technical survey includes:
- Searches using the latest technology capable of detecting both active and dormant GSM devices. This new technology is able to distinguish between ‘genuine’ GSM devices and those being used covertly and ensures that Control Risks can provide the most comprehensive sweep service on the market.
- “In depth” radio spectrum monitoring in order to determine electronic activity in the areas subject to examination. We use technology to identify digital audio devices, analogue radio transmitters and video signals emitted by covert camera operations
- Telecommunications assessment of all relevant telephone assets, including distribution boxes, telephone mainframe and cabling to search for illicit intercepts such as hardwired telephone taps
- Electrical supply examination to detect the presence of “mains powered” devices or circuits that are being covertly used as a transmission medium
- Physical searches which include ceiling/floor voids, furniture and fabrics for the presence of hidden recording and transmission systems. Covert microphones would be acoustically stimulated and detected during this phase of the inspection whether in a dormant or active state
- External attack assessment to consider whether optical equipment or high frequency “audio capture” systems might be used to eavesdrop externally
As a result of our survey we will provide recommendations for physical security, access control and existing information security provisions.
For more information on our Technical Surveillance Countermeasures services please contact us