Be confident of confidentiality

Covert listening device's which are more commonly known as bug's are normally a combination of a miniature radio transmitter with a microphone . The use of bugs, called bugging, is a common technique in surveillance and in particular industrial espionage. Most bugs transmit information, whether data, video, or voice, using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver, although a good working knowledge of RF theory is needed to operate the equipment effectively.

Sweeping is effective but not foolproof. Advanced bugs can be remotely operated to switch on and off, and some even rapidly switch frequencies in order to make the location of sweepers more difficult. Remotely activated mobile phone microphones known as ghost phones are available in any particular make or model and function quite normally. These phones however have been adapted to remotely activate the microphone, even when a call is not being made for the purpose of listening to conversations in the vicinity of the phone. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Burst transmitter bugs store recorded conversations in a buffer, then transmit the entire buffer in a short burst. This style of bug is almost impossible to pick up unless sophisticated scanning devices are running non-stop.

If you are suspicious that your premises or communications systems have been bugged, do not discuss your fears around the suspected area and try to isolate the area without making your fears known to anyone else other than the relevant people who need to know. Once you have done this use a private computer or telephone and contact us.

Our specialist teams have experience in debugging and have carried out numerous countermeasure inspections. They are fully conversant with the latest techniques and technology employed in the field of electronic surveillance

Devices that do not emit radio waves are much more difficult to detect. Instead of transmitting conversations, bugs may record them. Telephone bugging or tapping is the monitoring of telephone and internet conversations by a third party, often by covert means. The telephone tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. There are a number of ways to monitor telephone conversations. One of the parties may record the conversation either on a tape or solid-state recording device, or on a computer running call recording software. The recording, whether overt or covert, may be started manually, automatically, by detecting sound on the line or automatically whenever the phone is off the hook. This makes any business with information that might be valuable to an unscrupulous competitor vulnerable to industrial espionage.

Wherever confidential business matters are being discussed you are in danger of being electronically "bugged". In offices, boardrooms, laboratories and even hotel rooms or conference centres. Just imagine how adversely your business could be affected if vital information such as merger plans, new product information, acquisitions and financial forecasts fell into the wrong hands. It could even leave your business in ruins. We can provide fully trained expert personnel with the most advanced electronic sweeps, detectors and neutralisers to secure both your premises and your conversations.