CND Ltd provide services within TSCM (Technical Surveillance Counter Measures), this is the detection and removal of ‘bugs’ or listening devices of all kinds.
What to do if you suspect you are under surveillance:
If you suspect you are under surveillance, it is crucial to act promptly to safeguard your information and limit any damage.
- Cease all sensitive communication and remove yourself from the area you suspect is being targeted
- Do not discuss your suspicions with anyone who is associated with the workplace/area
- Do not use your mobile phone or land line phones within the target area, call CND from a payphone away from the immediate area on +44 (0)1225 811806 and ask for Yvette Fenton
- Do not attempt to find the bugs or wiretaps yourself as you may alert those doing the surveillance as to your intentions and give them the opportunity to make alternate plans.
- Tell only totally trusted people about your engagement of a bug sweeping team and only if it is necessary.
How do I know if I am a target for eavesdropping?
We cannot give you a definitive list of areas that are prone to eavesdropping; however in our experience we have seen patterns including the following motives;
Commercial Espionage: Organisations with recent success or patents that rely on professional or trade secrets. Organisations undergoing a business change, bidding for work, looking to start a new venture, mergers or acquisitions
Individual attack: A disgruntled individual may be motivated to glean confidential information with the purpose of blackmailing, selling or exposing the data.
Personal financial conflict: Divorce, Marriages or family units under strife
Confidential Information: Those involved in Security Cleared work or with access to vetted documents
Competetive Sports: Sports organisations and athletes such as football clubs.
Political: Politicians and people with access to political information
Lawsuits: Those involved in lawsuits in any way
Are there any signs that you may be under surveillance?
Every situation is different, and if you are under surveillance then the any number of events can lead to devices being deployed. A common and one of the most trust worthy snippets of advice is to Trust Your Instincts.
Here are a few other tell tale signs, however these neither confirms or denies that you or your business may be under surveillance.
- Supposedly private information is being leaked
- Phones: Interference or clicks during telephone calls. Static, scratching or popping noises on your phone line or your phone may ring but no one is there
- Disturbance to the suspected target area, an apparent break-in but with no theft.
- Radio interference, this is often pertinent in cars
- Unexpected gifts, this could be anything from a teddy bear for your desk to a clock or flowers. They could contain a camera or eavesdropping device.
- The arrival of unscheduled tradesmen, this may have been the means by which the bugs were planted.
How do we detect suspicious devices?
Using top of the range equipment our team will use a combination of radio frequency spectrum analysis to detect eavesdropping devices, a fingertip search of the target area, cable and telephony inspection and a physical inspection of hardwired electrical elements.
At all stages of the process we are extremely discrete.
What happens if you are under surveillance?
CND’s TCSM/bug sweep team will not alert the person(s) monitoring you that an inspection is being performed. We will discuss with you prior to the sweep what actions are to be taken if a listening device is found, you may wish to leave the device in place with the intention of giving misinformation and awaiting the results, pursue the person(s) listening and potentially pressing charges or simply to destroy the device(s)
Once the initial bug-sweep has been completed, consider whether you require follow-up or regular bug sweeps to ensure the areas stay clean and that vulnerable areas, such as meeting rooms or senior offices are safeguarded. If appropriate, we can also provide advice on increasing the levels of protection, such as mobile phone encryption.