In this post, I am going to give you some pointers and tips to help you discover if you have been infiltrated by someone using a TSCM bugging device. Here are the tell-tale signs you need to be looking for and need to recognize to prevent your information from getting into the wrong hands.
Has Anything Move Lately?
Take a look around you. Is anything out of place? Has anything been moved? Has anything disappeared and reappeared lately? Think of any way an intruder might have surreptitiously planted a bug in the rooms around you.
Lamps and picture frames are just a couple places you need to investigate as you conduct a physical search of the premises. In our Search Demonstration Video, we show you how to conduct a physical search.
Beware Unexpected Gifts
Have you received any gifts lately? Free samples? New products like a free blender or cell phone? Beware of things coming to you for free. If you suspect you are being bugged, it is very possible the intruder is trying to gain access to your information by planting a covert listening device. By offering you a free clock or some other artifact, you will actually be planting the device for them.
A bugged cell phone can track where you are, record your conversations, access your voicemails and texts, photos and email. Virtually your entire life is exposed, because we rely so much on our little pocket friend. Very simply, DO NOT accept any free cell phone. If you want absolute anonymity, purchase a pay as you go phone. They are the most secure mobile devices available on the common market.
Do Know Your Help?
Your business is secure. You have security during the day, CCTV cameras at night – and a well-screen staff. You go through great lengths to make sure your business secure. But, how well do you know the cleaning staff that is in your offices at 4am? I will often ask my clients when I am conducting a TSCM consultation, “What’s the name of the people on the cleaning staff?”
These people have a key to access anywhere in the building. Who is to say, someone hasn’t offered them $500 to plant or replace batteries in a covert listening device. I know this is possible, because I’ve tested it and caught a lot of cleaning company members who would do it.
Knowing is the best security. In our next video we will demonstrate how to conduct a TSCM search of an office using a RF scanning device.