• May 28, 2018

Spying might make you think of James Bond movies or the CIA… however many don’t realize, it’s become a larger part of the corporate industry and private sector.  Companies of all types are spying on each other…not always to steal trade secrets, sometimes to just gain a competitive edge.  Corporate espionage can not only be a security issue, but a grave corporate killer!  You may not see yourself as a target, but if you’re perceived as wealthy or a person of interest, ‘someone’ (competitor, disgruntled lover, an ambitious employee, etc.) will make you a target.  Without providing protection against a possible threat, you might find that new idea or invention part of a competitor’s product line.  If you’re a person of importance, or happen to work with sensitive items, someone might also try to blackmail you.

Within this article, I’ll discuss the various methods used for eavesdropping and what equipment and services are needed to conduct a thorough TSCM Sweep.  When hiring a TSCM company, vett them thoroughly and make sure they follow basic TSCM protocols.

© 2018, Darren L. Epstein, PI.   ALL RIGHTS RESERVED, NOT TO BE COPIED

 

TSCM Protocols:

  • Conduct a Thorough Physical Search.  
  • UV Light Sweep looking at vents, AC receptacles, etc. Once completed, mark areas.
  • An Audio Spectrum Search of the low Hz and high GHz range.
  • A Thermal Imaging Sweep looking for heat signatures within walls and/or furniture.
  • Telephone PBX and Physical Lines Analyzed / Time Domain Reflectometry
  • Inspection of computers and LAN connections.
  • Inspection of printers and computer output devices.
  • VLF, microwave and ultrasonic detection.
  • Non-Linear Junction Detector searching for remote bugs turned off.
  • X-ray items if necessary.
  • Oscilloscope survey to observe the changes of an electrical signal over time.
  • Install Transducers; audio jamming devices (acoustic white noise generators).

*Mobile phones, computers, Alexia/Google Devices, TVs, Gaming Systems, etc. are COMPUTERS that require ‘COMPUTER FORENSICS’.

OLYMPUS DIGITAL CAMERA

There has always been a need for spying…the ‘need to know’ what someone else was doing is a basic human trait.  The sophistication of eavesdropping has changed dramatically… as we move away from the ‘cup against the wall’ and towards laser listening devices and high spectrum frequency hopping, the basics and principles still remain.  First off, you might be asking yourself…what does TSCM mean?  If you’re searching for a company to conduct a debugging or were researching the topic, you most likely came across the term, TSCMTechnical Surveillance Counter Measures (TSCM) is the science of looking for eavesdropping equipment.  On the other hand, a technical surveillance device (TSD) is an item designed to intercept communication or conversations, more commonly known as bugs. There are many countries that illegally import eavesdropping and bugging equipment into the United States, such as France, Germany, Lebanon, Italy, Canada, Israeli, England, Japan, Taiwan, South Africa…etc.

 

The U.S. Department of State (referenced in 1997) estimates 6,550 corporate eavesdropping incidents take place each year and approximately 888 million dollars of illegal eavesdropping equipment is imported into the United States each year.  Compared to the losses… it’s unconceivable, costing corporate America closer to 800+ billion per year!  The FBI and other federal law enforcement agencies have openly stated they lack the resources and training to enforce and investigate technical countermeasures (bugging).  

 

Eavesdropping equipment can be hardwired or wireless, most commonly radio frequency (Hz, Mhz, Ghz, etc.).  Eavesdropping can be conducted by leaving a device behind to gain Intel, however many newer devices can be remotely activated.  Listening devices can also be hidden or disguised within ordinary products, making them difficult to locate, e.g. alarm clocks, smoke detectors, etc.  Depending on the sophistication, some culprits will use existing devices and/or technology to listen in and gather Intel, e.g. (Telephone Wiring, Cellular GSM, Cable TV, Wi-Fi, Bluetooth, and even AC circuitry).  Today with phones and TV’s acting more like computers… you also have to search for computer viruses.

A well-planned virus could turn your laptop mic/webcam into a listening device or turn your mobile phone into a power mic.  You could enter a boardroom without knowing your sharing trade secrets with a competitor.  Knowledge is POWER, be informed so you’re protected!

 

If you are concerned about eavesdropping taking place, I implore you to take it seriously and contact our offices or a TSCM specialist you trust and have vetted.  NOT FROM THE LOCATION IN QUESTION!   Do not call from your cellular phone, it could have been compromised!  If you decide to walk into our office, make sure you weren’t followed!  If you purchased a new prepaid mobile phone with cash… feel free to call us but do it from a secure location!  Not your car, it could have been compromised.  Call us from a location with background noise (white noise), e.g. a busy mall, and walk as you are talking, don’t stay stationary; don’t be paranoid… but safe and smart!  Whoever you decide to use to conduct your TSCM, make sure the company retained is comprised of – knowledge, experience, and state of the art government grade equipment.  TSCM Services is a science, you need a qualified technician searching the low Hz to high GHz ranges.  There are numerous ways to eavesdrop and gather intelligence, below I list the most common attacks along with various equipment necessary to conduct a professional TSCM Sweep. 

 

  1. Microphone and tape recorder: The most common and easiest type of eavesdropping.  Very versatile… it can be worn, placed in a room, and even turned on remotely or by voice activation.

 

  1. Transmitters (Bugs): The microphone or video Intercepts the communication and transmits it as radio signals, i.e. 900 MHz, 2.4 GHz…etc. Some bugs are self-contained with microphone, transmitter and power supply.  The sophistication ranges from simple intercom systems to professional government bugs.  Since these devices are sending signals, we look to locate their spectrum waves; we do this by using a spectrum analyzer.  Some bugs/transmitters are turned off and are turned on remotely, aka (remote bugs).  This type of transmitter can defeat a spectrum analyzing sweep, as well as a thermal imaging sweep.  If the remote bug is turned off, there wouldn’t be a signal sent to pick-up and detect, nor would there be much heat generated.  Due to such, we suggest using a TSCM device that can locate transmitters turned off or hidden within walls.  This type of TSCM device (Non-Linear Junction Detector) doesn’t search for signals or heat…but rather it locates, circuit boards, diodes, and the mini magnets needed within these devices.

 

  1. Through Wall Listening Devices: There is also equipment that can hear through walls, including brick walls; commonly used in situations with adjoining rooms (office, hotels, and apartments).

 

  1. Laser Bounce Listening / IR Devices: This is or was a high-tech method for eavesdropping, however with the change of technology and information on the Internet into how to build your own laser microphone, it has become more accessible. The laser consists of a beam, usually an invisible infrared beam (RF), like your remote control when you increase the volume on your TV; the laser is normally bounced off a window and it captures the audio.  It then sends the audio information back to the person who is conducting the eavesdropping.   Professional laser listening devices can shoot a beam into a hotel room from another building nearby to intercept what’s being said.

 

TECHNICAL SURVEILLANCE COUNTERMEASURES 101

Conduct a three-part search looking for Hardwire (HW), Radio Frequency (RF), and Laser/Infrared bugs. The three-part search will consist of a physical search, telephone/phone lines, and spectrum/audio search.  Use GSA and DOD certified equipment!

 

Hardwire:           (Telephone, Telephone Line, and Carrier Current Search)

Listening devices that can be attached to your phone, telephone line, telephone system or even transmit your conversations over the AC power, via Carrier Current transmissions.  These bugs are often powered by the line itself, so it pulls low amperage (ohms), making it difficult to detect.  They can also be placed on your line outside, at the junction box, and professionals can even tap into your lines miles away.  Rest assured, we check your lines from your address to the telephone company central station.  Our Time Domain Reflectometry equipment & spectrum analyzer sends signals through the line to the central office.  We’re able to determine if your phones are being tapped from within your office or outside.  Landline telephones produce amperage, aka (ohm) and our equipment will locate the amperage or ohm drain taking place and then locate the location of that drain.  The AC wiring within your home or business can also transmit your conversations via Carrier Current.  Right over the AC power wiring, rather than using radio signals.  The eavesdropper can listen from any point along the AC wiring until it goes through the electrical company’s next transformer.  Rest assured, we also search A/C outlets and Carrier Current transmissions.

 

Mobile Cellular Phone:         (Computer Forensics)

Searching a Mobile Phone for a listening device is more computer nerd then James Bond, the process is different.  The mobile device is a computer, where computer forensics will determine if information is being sent out of your phone without your knowledge.  We are basically looking for a virus that is transmitting your data to another email or IP address you aren’t aware of.  Cellular Phone Debugging needs to be conducted by a trained computer forensic expert (we have on staff).

 

Radio Frequency (RF):          (Spectrum & Audio Search)

Sends wireless signals throughout the air, any FM/AM radio or scanner device can intercept these signals.  RF transmitters can be as small as a regular bug, but they need power to operate, often making them larger.  RF Bugs can be battery or hardwired for power.  They can be located within electrical outlets, A/C vents, ceiling tiles, under furniture, etc.   A Physical Search helps, but you need a professional RF locater, also known as a spectrum analyzer.  Cellular phones, portable phones, and various equipment send signals, we are looking for these signals.  A top-quality spectrum analyzer searches the low Hz, MHz, to high GHz frequency range.

 

GSM, TV, Wi-Fi, Bluetooth+ (Spectrum & Computer Signal Interception)

There are various new ways a culprit can gain access to your private information.  They can strategically virus your Mobile Phone or TV to access the preinstalled camera and/or mic.  Additionally, other forms of communication like Wi-Fi and/or Bluetooth are being used to hack your various devices, only to be turned against you.

 

IR Laser Listening Devices:

Often expensive, professional models are $25k+… but YouTube will teach you how to make a crude version.  A laser (IR) “infrared” beam is shot into the room where observation is wanting to take place. The audio is transmitted back and decoded.  The culprit shoots the IR invisible beam through a window or similar opening.  Difficult to use for you need a direct line of sight.

NOTE:  An operative could use an IR Listening Device and a RF transmitter… shooting the laser into a window while transmitting the data to a distant location, for the ultimate Intel and protection.

 

Physical search:

The removal of all electrical outlets, air vents, ceiling tiles, smoke detector covers, light switch covers…

 

OUR EXPERIENCE

  • Our Technician is Department of Defense Classified for Conference Sweeps
  • United Nations Delegations — Sweeps of Mission Offices
  • Sweeps Federal Agencies, Federal Court Rooms, Federal Commission, Embassies, etc.
  • Governors – Audit of offices and Cabinet Member Homes
  • Mayor’s Office and Comp Controller’s Office – Sweeps after 9/11
  • Fortune 500 Companies
  • Celebrities – High Profile Hollywood Celebrity Sweeps
  • Sweep of Private Island Residences & Yachts
  • Audit of Exec Offices, Aircraft & BOD meetings in Oil Industry.
  • Law Offices — Examination of offices during critical litigation.
  • Religious Leader — Sweep of residence and office.
  • Political Headquarters — Audit of strategy room & exec offices.
  • Gaming — Audits of major corporate offices and residences.
  • Media — Sweep of major executive broadcasting offices.
  • Defense Contractor — Sweeps of management offices.
  • Forbes List Elite — Sweeps for numerous EP organizations.

OUR TECHNICAL TRAINING:

  • United States Air Force / Defense Industry
  • Former Police Officer
  • Law Enforcement Technology Degree:  Primary focus CSI, emphasis on forensic technology.
  • Certified Communication Electronics Technician:  NRI Certified with FCC 1st Class Radio Technician & Microwave endorsement.  Practical bench and field tech experience.
  • Facility Security Management:  Department of Defense FSO certified in Information. Security & Classified Information Management.
  • National Security Agency certified, COMSEC custodian.
  • Federal Bureau of Investigation DECA.
  • Certified Facility Security Manager / DOD.
  • TSCM / REI – Sherwood.

Our TSCM technician has been a guest speaker for the TSCM Division of the Federal Bureau of Investigation, The Espionage Research Institute and American Society for Industrial Security.

 

SELECTING A QUALIFIED TSCM PROVIDER:

  • First, Verify the provider has attended a recognized TSCM academy. The ITC is the government school which is about 40 weeks long.  The best private academy is REI located in Tennessee.  Their courses are provided in modules, with the understanding the students have a communication electronics background.  (Ask for copy of diplomas).  The majority of vendors conducting TSCM have No formal training in the field.
  • Second, Verify the provider has “real” TSCM equipment. State of the art detection equipment costs range from $100k to $300k plus!  It’s NOT an inexpensive hobby. They should have:  (1) OSCOR Blue Spectrum Analyzer, (2) TALAN Telephone Analyzer, (3) ORION Non-Linear Junction Detector, (4) FLIR Thermal Camera.
  • Third, determine that the person providing the service conducts sweeps on a regular basis. Some firms conduct a few sweeps per year… you don’t need fancy equipment without a serious processional knowing how to use them.

Frequencies of Interest:

Audio Detection 300 Hz to 15 kHz Base Band Audio
Ultrasonic 10 kHz  to 150 kHz Ultrasonic Audio
VLF-Free Space 20 kHz to 350 kHz Video Cameras & Tape recorders
Carrier Current .3 kHz to 50 MHz 99% Voice (CC and PLA)
Carrier Current 10 MHz to   450 MHz 99% Voice (AC Mains Antenna)
Free Space-HF 3 kHz to 50 MHz 99% Voice
Free Space-VHF 30 MHz to 300 MHz 10% Video/80% Voice/10% Data
Free Space-UHF 300 MHz to   900 MHz 25% Video/60% Voice/15% Data
Free Space-MW1 900 MHz to   3.0 GHz 50% Video/40% Voice/10% Data
Free Space-MW2 3 GHz to 18.0 GHz Mostly Video and Data
Free Space-MW3 18 GHz to 26.5 GHz Mostly Video and Data
Free Space-MW4 26.5 GHz to 40.0 GHz (optional, based on threat) & UV Infrared!
150 – 450 nm Modulated UV Light Bugs
350 – 700 nm Modulated Visible Light Bugs (450 to 675nm very common)
700 – 1100 nm Audio Transmitters/Lasers (880 to 950nm very common)
800 – 1510 nm Audio Transmitters/Laser Microphones (rare)
750 – 900 nm Night Vision Illuminators
850 – 1750 nm IR Bugs & IR Illuminators & optical bugs installed in – (light bulbs, etc.)
450 nm Modulated Tungsten bugs
490 nm Modulated Sodium bugs
575 nm Modulated Fluorescent bugs
50 – 750 kHz Carrier Current Bugs (power, phone, HVAC lines)
25 – 80 MHz Ultra-low power devices (micro watt devices)
65 – 130 MHz Micro power Part 15 devices (FM broadcast band)
130 – 150 MHz Body Wires and Wireless Microphones – Band I
150 – 174 MHz Body Wires and Wireless Microphones – Band II
174 – 225 MHz Body Wires and Wireless Microphones – Band III
295 – 310 MHz Spread Spectrum and Micro Powered Bugs (micro watt devices)
330 – 440 MHz Audio/Video Bugs (398.605, 300.455, & 399.030 MHz are popular)
430 – 550 MHz Audio/Video Bugs (433.920 and 418 MHz is popular)
800 – 990 MHz Audio/Video Bugs (902-985 MHz ISM band is popular)
1.10 – 1.95 GHz Video and Audio (980 MHz to 1.45 GHz is very popular)
2.00 –  2.75 GHz Video and Audio (2.4 to 2.45 GHz is extremely popular) 5.60 –  7.50 GHz
5.60 –  7.50 GHz Video and Audio (5.8 to 6.2 GHz is becoming very popular)
8.10 – 13.00 GHz Video and Audio (Popular)
850 – 950 nm Infrared Transmitters
DC – 3 kHz Typical Audio Band
3 kHz – 500 kHz Skin Effect (Non-Radiating)
500 kHz – 3 MHz Non-Radiating, Conducted RF
3 MHz – 300 MHz Conducted RF, Free Space Radiating
300 MHz – 3 GHz Free Space Radiating RF, Slightly Directional
3 GHz – 22 GHz Free Space, Low Attenuation, Highly Directional
22 GHz Water Vapor Absorption Band
60 GHz – 3 THz Limited Usage for Covert Surveillance

Government Grade TSCM Debugging Equipment:

RADIO FREQUENCY SPECTRUM ANALYZING is performed using the REI OSCOR Blue.

The RF spectrum from 10 KHz to 24 GHz (as a minimum) is examined. Radio transmissions are captured and mapped to identify the presence of covert transmitters from within the protected area.  (This analyzer will detect the latest burst, spread spectrum and frequency hopping devices, which is why federal

intelligence agencies use the OSCOR Blue.)

 

 

 

DIFFERENTIAL RF ANALYSIS is performed using the Audiotel Delta V analyzer.  Radio signals from 50 KHz to 5 GHz are processed using differential comparison techniques.   (In metropolitan areas with high RF saturation, this detector pinpoints the transmitter source.)

 

 

 

CELLULAR TESTING is performed using the Blood Hound.   Covert GSM transmitters are pinged using a proprietary technique to analyze up link utilization.   (The new era of surveillance technology is cell phone frequency bugs, which the majority of detectors will ignore.)

 

 

 

 

REAL TIME SPECTRUM ANALYSIS is performed using the RF Hawk.  This analyzer covers 50 KHz to 6 GHz. (The DSP allows us to look inside conventional radio signals to detect covert transmitters broadcasting within legitimate carrier envelopes.  It was specifically designed to identify, track and locate radio transmissions.  Less than 2% of sweep firms have this technology.)

 

 

 

 

 

INFRARED THERMOGRAPHY is performed using the FLIR Scout to identify thermal signatures from covert devices.  (Thermal signatures given off by covert surveillance devices and can be seen, when converted to visible light.)

 

NON-LINEAR JUNCTION DETECTION is performed using the REI ORION.  High frequency RF signals are beamed into critical surface areas to illuminate covert electronic devices.  (Virtually all surveillance technology uses electronic components, which are detected even if the device is switched off.)

 

 

 

 

 

ADVANCED TELEPHONE ANALYSIS is conducted using the REI TALAN.  Comprehensive electrical measurements are taken on all line permutations for voltage, current, resistance, capacitance, audio paths, and line based RF signals.  In addition, Frequency Domain Reflectometry is utilized to identify suspect connections on copper conductors.  As a final test, NLJD is performed on all line pairs to detect unauthorized electronic devices.)

 

 

 

 

 

 

WI-FI ANALYSIS is performed using the Air Magnet LAN Analysis and Spectrum Analysis Software / Technology.  Specific devices are mapped and analysis is performed on each signal encountered.  (Many surveillance devices operate of Wi-Fi / Bluetooth Technology).

 

FIBEROPTIC INSPECTION is conducted using a variety of manual and electronic imaging techniques to examine areas which offered limited accessibility.  (Digital Voice Recorders and Covert Cameras are often hidden in HVAC ducts.)

 

EQUIPMENT TO DEFEND YOU ONCE WE DEPART

ANG2200 White Noise Generator Professional.  This professional white noise generator defeats such listening devices as wired microphones buried in a wall, contact or spike microphones, transmitters located in AC outlets and laser/microwave reflection from windows.

 

 

 

REI’s TRN-2000 is a specially designed Transducer used to inject acoustic noise into walls, finished ceilings, windows, plumbing, and air ducts.

 

 

 

 

WMT-2000 Transducer Window Mount provides a safe method of attaching the TRN-2000 to a glass surface

 

OMS-2000 Omni Speaker is used with the ANG-2200 to project acoustic noise into drop ceiling air spaces, closets, crawl spaces, and air ducts.

 

 

 

 

 

Laser Mic Surveillance Defeater Laser Countermeasure Surveillance Protection Device

 

Family of Bugs:

Free Space Emission
Acoustic/Audible Pressure Waves
Acoustic/Ultrasonic Pressure Waves
Optical/Invisible Light (UV, etc…)
Optical/Visible Light
Optical/Invisible Light (Infrared, etc…)
RF Transmission (VLF) 3 kHz – 3 MHz
RF Transmission (HF) 100 kHz – 70 MHz
RF Transmission (VHF) 30 MHz – 300 MHz
RF Transmission (UHF) 300 MHz – 1 GHz
RF Transmission (Microwave Low) 900 MHz – 3 GHz
RF Transmission (Microwave Mid) 3 GHz – 12.5 GHz
RF Transmission (Microwave High) 12.5 GHz – 26.5/33/40 GHz
RF Transmission (Microwave mm) 26.5/33/40 GHz – 325 GHz
RF Transmission (Microwave mm2) 325 GHz – 1.5 THz
Free Space – Magnetic
Conducted Emission:
Audible (Voice Frequency)
Ultrasonic
Video
Current Carrier up to 500 kHz (AC Mains, Phone, CATV, etc.)
Radio Frequency (AC/Mains Devices, waveguide, etc.)
Fiber Optic

 

© 2018, Darren L. Epstein, PI.   ALL RIGHTS RESERVED, NOT TO BE COPIED

Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to [Darren L. Epstein] and [Counter-Intelligence.com] with appropriate and specific direction to the original content.

2 thoughts on “COUNTERMEASURES Debugging Spying Devices”

  1. Jane Vega
    July 30, 2018 at 1:19 pm

    Concerned about personal or injectable bugging devices.

    1. Darren
      July 30, 2018 at 1:39 pm

      I suggest you make contact with our office by random phone (a friends phone, a random business phone). Please keep confidential info off of this blog for your protection. Keep in mind… you are unaware if it’s a telephone bugging device or a computer virus, both can obtain audio or video and transmit it. So we careful when using email, computers, mobile phones, etc. until a complete thorough search can be completed.

Leave a Reply

Your email address will not be published. Required fields are marked *