We'll unTap That!
There are limitless types of wiretaps, audio & video bugs that can be used to illegally eavesdrop on your most secret business and personal conversations. Many people are intrigued by the “sexy” reputation of covert, spy devices. However, the actual damage they cause to businesses and governments annually is catastrophic. Make no mistake, because of the availability of inexpensive devices, the viability of your business and the sanctity of your personal privacy are at risk. At Spy Tech Investigations, our experience, training and equipment will help protect you from an illegal wiretap.
For several reasons, a wiretap is the preferred method of stealing intelligence. It requires tapping into a carrier current wire or other conductor that is used for communication. Telephone lines, cables, LAN networks and alarm systems are often targeted. The primary goal of a wiretap is to secure high quality information and minimize to possibility of being detected. Remember radiated signals are easily detected, wiretaps require much more extensive equipment and training to detect.
HARDWIRED WIRETAP – A set of wires attached to an “isolation” or “slave” device is attached to an existing wire that a signal travels on. The signal can then be intercepted or bridged bank to a secure location. When found, this device is easily traced back to the listening post. These taps are very popular with law enforcement but not usually within the ability of the typical eavesdropper.
SOFT WIRETAP – This requires a modification to the phone system software through the telephone company or a business PBX. It is the preferred method of law enforcement, intelligence agencies, larger corporations and hackers who have the ability to access maintenance software. These can be found on a business PBX board, but it a very lengthy and tedious process. They are also easily discovered through the phone company but it requires unfettered access to their computers which is extremely difficult for anyone other than law enforcement to obtain.
RECORDING WIRETAP – This is quite simplistic and is simply a tape recorder hard wired into the phone line and the tapes must be switched out regularly. It is very easy to find with a professional TSCM inspection. This is a favorite of the amateur spies and private investigators but many are caught as they are attempting to service their illegal recorder. Although digital recorders have replaced tapes, they still require someone to show up to retrieve the data.
TRANSMITTING WIRETAP – This type of bug is an RF (radio frequency) transmitter typically containing a mini microphone that is connected to a carrier current wire. These are very popular taps, but due to the RF energy produced, they are easily detected by an experienced TSCM bug sweep specialist with the proper equipment.
If they are properly installed it is difficult to detect wiretaps without a high level of experience and training. There are many private investigators who claim to provide TSCM services. However, it is impossible to find any surreptitious device with a cheap spy shop bug detector. That requires extremely sophisticated and expensive laboratory grade instruments operated by professionally trained technicians like those at Spy Tech Investigations.
If you have any concerns that your business or personal privacy is under attack from covert eavesdropping, call Spy Tech Investigations today. Our experts can answer your questions and give you the peace of mind you deserve.
We have the laboratory grade, technologically advanced equipment necessary to professionally perform any TSCM services. We are experienced in providing TSCM, bug sweeps and counter surveillance investigations for a wide range of clients from large corporation board rooms and offices to the average residential home and vehicle.
Do you or your business have the potential to increase another’s wealth, power or influence? If the answer is yes, you are a potential target for illegal eavesdropping and should carefully pay attention to the Warning Signs of Covert Bugs. The use of covert electronic audio and video bugs is to the point where it is almost commonplace.
Below is a non-inclusive list of Warning Signs of Covert Bugs that should alert you to the possibility of some kind of surreptitious eavesdropping device. If you have any concerns, you should call Spy Tech Investigations immediately for some free, confidential advice. Please do not call us from your own phone. Use a sterile phone at an offsite location so that we can arrange for a technician to get to your location as quickly and quietly as possible.
The following are just a few of the Warning Signs of Covert Bugs that should prompt you to call Spy Tech Investigations in Florida to perform a TSCM Inspection:
Others seem to know your confidential business or trade secrets: This type of theft is one of the most common and is a multi-billion dollar criminal industry.
People just seem to know too much about your private or business activities: Do you want competitors to know your designs or project quotes?
You noticed strange sounds or volume changes on your phone lines: It could be just a flaw in the line, or it could indicate an amateur job but can be Warning Signs of Covert Bugs. A professional would never place any device that would leave any sounds, but it should be checked out.
You held a private meeting, but people seem to know what was discussed: High level meetings, mergers and bids are prime targets for illegal eavesdropping. The spies are determined to steal your designs, takeover plans strategies and client lists.
Your monthly revenue stream has unexpectedly gone down: Perhaps your CPA tells you that the monthly $50,000-$60,000 you have routinely been seeing has only been in the $15,000 to $20,000 range for the past several months. Your “bottom line” is where any internal corporate espionage will be detected first.
There has been a burglary at your office or home but nothing was taken: Although there may not be any obvious evidence of a break in, professional corporate spies often uses this technique to place covert devices. Furniture or objects “slightly” out of place might give you the feeling that something is just not right.
Inspect all wall plates such as switches, outlets, thermostats, alarms: These are very common locations for carrier current “parasitic” audio devices to be placed. Look for a plate or screws to be slightly moved, or hints of dust or debris on the floor all of which can be Warning Signs of Covert Bugs.
Small “Dime Sized” discoloration on the wall or ceiling: This can be evidence that a hidden pinhole audio or video device was recently installed.
New or unexplained items appear in your office or home: Look for lamps, pens, picture frames, staplers, clocks, sprinkler heads, power strips, exit signs, etc. All of these items and many more have been utilized to plant covert “Trojan Horse” eavesdropping devices.
Without being called, various “repair” people suddenly appear to do work: Common contrived “outages” such as air conditioning, electricity, telephones or plumbing issues are commonly used. Once inside, they tend to the problem and also install hidden bugs
Utility service trucks or workers are spending a lot of time nearby: According to a training course by U.S. State Department, you should not see the same or similar vehicles more than 3 times in a short period of time. Actual workers typically arrive, fix the problem and move on to their next appointment.
The door lock suddenly sticks, or can’t be opened at all: This is an indicator that the lock may have been picked. Most key locks can easily be picked in a matter of seconds with a readily available “bump key”. As a general rule, although susceptible to picking, we believe biaxial locks such as Medeco with security sidebars is one of the more secure manual key locks available.
Acoustical ceiling tiles chipped, cracked or ajar: You may also notice some dust on the floor or your desk. These can be Warning Signs of Covert Bugs planted by an amateur or poorly trained eavesdropper should never be present in your office. If you notice anything like these indicators, you should immediately call for a TSCM inspection to ascertain whether any covert bugs have been installed.
Anyone can be targeted for covert eavesdropping. However, some are at a greater risk due to financial position, occupation and legal or domestic situation. Anyone who has money, power, influence or access to sensitive business or personal information is at risk and should be aware of the Warning Signs of Covert Bugs.
One of the most professional, intelligent and highly responsive experiences I've ever had. Timely information, courteous demeanor and helpful advice are just a few of the benefits of working with Rick at Spy Tech Investigations. Highest recommendation is easily passed on!
I needed a private investigator skilled in cyber investigation services in the Tampa area. After much research, I found Spy Tech Investigations. The owner asked me quite a few questions about the details of my case and then he set proper expectations. I was pleased to know that they are forensic experts in cyber investigation. Hiring Spy Tech Investigations was an easy choice. They provided me with the indisputable evidence that I needed for my case. They exceeded my expectations!
I've used Spy Tech Investigations several times over the last few years. Primarily with private investigation work. He even helped my daughter, who is a teacher, catch a student who was stealing money at her high school. Rick provided her with a key fob for her car which contained in it an HD hidden camera. They filmed the crime and caught the thief. Highly recommend!