What’s Bugging You? An Overview of Nasty Harassment Devices You Need to Lookout For!

What’s Bugging You? An Overview of Nasty Harassment Devices You Need to Lookout For!

I want to expose some of the more nasty electronic harassment devices being used to day. These are simple devices that will absolutely drive you crazy.

Are your ears ringing? Do you have trouble focusing or concentrating and can’t understand why? Does anyone have motive or cause to harm you? You could be a victim of electronic harassment. It happens more often than you think!

The (TSCM) or Technical Surveillance and Counter Measures business is booming! More and more people are complaining of hearing noises in their head or something at home just doesn’t seem right. Electronic harassment is on the rise, and the tiny-sized harassment devices demonstrated in this video may be the culprit. This video shows you what to look for, what these devices can do and what you need to do to protect yourself.

Purchase one of our personal bug detection devices today!

Devices like the Mind Molester and the Mind Molester 2 are shameful products that have been discovered while performing TSCM bug sweeps. The purpose of these devices is to drive people crazy! They emit random sounds, voices or a high-pitched whine that is barely audible. These devices are small, making it difficult to detect where the noises are coming from without the assistance of a bug detection device. Sadly, these devices are legal and can be easily purchased online. That being said, it’s up to you to protect yourself!

Buy Spy Gear Online:

https://www.discreetdevices.com/shop
For our complete inventory of professional TSCM devices, personal bug sweeping devices, bug detection services and more, visit our shopping cart. If you are in the market for surveillance equipment, spy gear or safety and security equipment, Total Security specializes in a wide range of video surveillance cameras and spy equipment systems. We are experienced, trusted leaders in covert hidden camera systems, nanny cameras, security video equipment, wireless spy cameras and digital motion activated cameras.

Detective Agency:

http://www.specialsol.com
Special Solutions is one Chicago’s most accredited and premiere investigative agencies. Whether it’s domestic, corporate or undercover investigations, we’ve done it all. When you engage special solutions, you engage top, seasoned professionals.

An IDIOT'S Guide to DOOMSDAY PREPARATION

An IDIOT’S Guide to DOOMSDAY PREPARATION: 8 Things You Must Know

With the world in crisis, many people are preparing for the worst. Without even mentioning terrorism and natural disasters, the decline of the dollar alone could signal a zombie apocalypse. These are not the zombies in movies however. These are people just like you and me, with no means to support their family. They will take to the streets using any means necessary to take what they need.

 

An IDIOT’S Guide to DOOMSDAY PREPARATION covers it all.

 

Individual Chapters of this series can be viewed below and include:

1) Strategic Communication
2) Personal Protection
3) Food & Water
4) Lights & Illumination
5) Health & Hygiene
6) Know Your Amigos
7) Normalcy Bias & Cognitive Dissonance
8) Nuclear, Biological & Chemical Attack

 

An IDIOT’S Guide to DOOMSDAY PREPARATION

Intro:

This video is an intro to An IDIOT’S Guide to DOOMSDAY PREPARATION. It covers the basic why’s and wherefores for prepping.

 

Chapter 1:  STRATEGIC COMMUNICATION

This is the prepping process of communicating with your loved ones prior to an incident and forming a plan to either bug in or bug out, creating a rendezvous point having a means of communicating after traditional communication systems go down.

 

Chapter 2:  PERSONAL PROTECTION

It is all about protecting yourself in a worst-case scenario – when all hell breaks loose. From lethal to non-lethal methods. It is essential to protect yourself and your family. The truth is: You’d like to think people will act civilized and orderly in an emergency. Unfortunately, history has proved otherwise.

 

Chapter 3:  FOOD & WATER

It’s a no-brainer! You need to eat. And water is essential for life. Here are some simple strategies for prepping and storing the two most precious supplies you will need.

 

Chapter 4:  LIGHTS & ILLUMINATION

It helps to see what you’re doing in the dark, and when the system goes down, you will need alternate sources of light. Devices that are portable and long-lasting are the best. In this video we will give you ideas of what works best.

 

Chapter 5:  HEALTH & HYGIENE

Let’s face it, if you’re required to bug in and end up staying with the same people for any long period of time, good health and hygiene are essential. This video gives you ideas for keeping a sanitary camp and offers some preventative measures for staying healthy.

 

Chapter 6:  KNOWING YOUR AMIGOS

How well do you know the people you plan to spend your darkest times with? How well can they keep it together in times of crisis? These are the hard questions to ask. But by asking them, it not only helps you define your list of travelling companions, it also prepares you to be more reliable mentally when things get nasty.

 

Chapter 7:  NORMALCY BIAS & COGNITIVE DISSONANCE

Many people live in a fantasy – a dream land. They think that nothing can happen to them. They are in denial. This video talks about how some people would rather bury their head in the sand than face reality.

 

Chapter 8:  NUCLEAR, BIOLOGICAL & CHEMICAL ATTACK

What countermeasures are available to you today to minimize the effects of an NBC attack?  These are the basic items you need to survive. Don’t be caught unprepared! Sometimes it’s the little things that make all the difference.

Discreet Devices ARE YOU BUGGED Are They Following You?

ARE YOU BUGGED? Part 5: Are They Following You?

This is our final installment in our series on TSCM electronic countermeasures, bugging and electronic harassment.

Electronic counter-measures and harassment includes the use of GSM or GPS tracking devices. It is illegal for someone to place a GPS tracking device in a vehicle they do not own. If you are a victim of this type of electronic harassment it is a crime.

GPS tracking devices have the ability to track your vehicle’s movements, updating your position every 5 seconds from anywhere in the world. Batteries for these devices last between 7 to10 days. External batteries allow GPS devices to track you for up to 6 months.

When conducting a physical search of your car, it is improbable that a TSCM tracking device will be found under the hood. There are far too many wires and electrical components that cause interference for a GPS tracking device. Plus far more maintenance is performed in the engine compartment than any other place in a car. The likelihood of a mechanic discovering the device makes it an undesirable place to hide one. The same goes for the dashboard. There are too many electronic devices that cause interference, making this an unlikely place for a bugging device.

The back half of the vehicle is where you want to look.  You want to do a really good physical search of the rear half of the vehicle. Inside the vehicle, check the rear pockets and plastic side compartments. Outside the vehicle, check underneath where the spare tire is kept. Also, look around the wheel wells. GPS tracking devices can be placed in magnetic boxes that adhere to anything metal, so you want to slowly walk around the car inspecting the bumper, wheel wells, and metal components like the gas tank, frame and any other areas a GPS tracker can be fastened to. To be completely thorough, a physical search should be followed up by an electronic search, using an X-10 or X-20 TSCM debugging unit.

For more information on TSCM devices or if you have questions concerning your security, especially if you think you are being bugged or are a victim of electronic harassment – contact Discreet Devices.

Discreet Devices - ARE YOU BUGGED? - Watch and Beware!

ARE YOU BUGGED? Part 3: Watch and Beware!

In this post, I am going to give you some pointers and tips to help you discover if you have been infiltrated by someone using a TSCM bugging device. Here are the tell-tale signs you need to be looking for and need to recognize to prevent your information from getting into the wrong hands.

Has Anything Move Lately?

Take a look around you. Is anything out of place? Has anything been moved? Has anything disappeared and reappeared lately? Think of any way an intruder might have surreptitiously planted a bug in the rooms around you.

Lamps and picture frames are just a couple places you need to investigate as you conduct a physical search of the premises. In our Search Demonstration Video, we show you how to conduct a physical search.

Beware Unexpected Gifts

Have you received any gifts lately? Free samples? New products like a free blender or cell phone? Beware of things coming to you for free. If you suspect you are being bugged, it is very possible the intruder is trying to gain access to your information by planting a covert listening device. By offering you a free clock or some other artifact, you will actually be planting the device for them.

A bugged cell phone can track where you are, record your conversations, access your voicemails and texts, photos and email. Virtually your entire life is exposed, because we rely so much on our little pocket friend. Very simply, DO NOT accept any free cell phone. If you want absolute anonymity, purchase a pay as you go phone. They are the most secure mobile devices available on the common market.

Do Know Your Help?

Your business is secure. You have security during the day, CCTV cameras at night – and a well-screen staff. You go through great lengths to make sure your business secure. But, how well do you know the cleaning staff that is in your offices at 4am?  I will often ask my clients when I am conducting a TSCM consultation, “What’s the name of the people on the cleaning staff?”

These people have a key to access anywhere in the building. Who is to say, someone hasn’t offered them $500 to plant or replace batteries in a covert listening device. I know this is possible, because I’ve tested it and caught a lot of cleaning company members who would do it.

Knowing is the best security. In our next video we will demonstrate how to conduct a TSCM search of an office using a RF scanning device.

Are You Bugged? - Doing a Physical Search

ARE YOU BUGGED? Part 2: Doing a Physical Search

If you suspect you are a victim of someone planting a bug in your home or business, the first step is to conduct a proper physical search. This requires getting down and inspecting every area someone may have placed an eaves-dropping device. Put on sweatpants, gym shoes and get a ladder, because you are going to be crawling around on the ground and getting up high to inspect the ceiling.

If a device is powered by 110V 0r 240V AC lines, you may be able to find it by following exposed electrical conduits and inspecting all outlets. If you have a drop-ceiling, be sure to get up above the tiles and thoroughly inspect all areas, especially any electrical sources. Inspect all electronic devices like lamps, clocks, radios and telephones, especially if there are any ‘NEW’ devices that have recently appeared or have been given to you as a gift. Don’t forget to inspect any ceiling fixtures; lights, fans and smoke detectors. Finally, check under and behind all furniture, picture frames and wall hangings.

To perform a complete search, consider purchasing a professional countermeasures debugging device. These devices have the ability to detect the presence of radio frequencies and hidden video cameras. Electronic countermeasures equipment can be purchased through the Discreet Devices Spy Shop: www.spysource.net.

If you want absolute peace-of-mind, Special Solutions will conduct a professional bug-sweep of your home or office, using the latest state-of-the-art debugging equipment. Our trained professionals have conducted countless searches for our clients and know exactly where to look. If you know you are being bugged, we will find it.

Are You Bugged? - Overview

ARE YOU BUGGED? Part 1: (TSCM) Technical Surveillance Countermeasures Overview

This is the first installment on electronic surveillance, commonly known as bugging. This is a fundamental practice in the spy world, corporate espionage and personal information gathering.  Electronic harassment is on the rise. Our office has been getting more calls from people claiming to hear voices in their head or things are not right at the office or information is getting leaked out, and it is impossible to explain how it could be happening.

Technical Surveillance Countermeasures (TSCM) has become a widely used term that encompasses all aspects of electronic surveillance monitoring. Simply put, if a business has intellectual property or trade secrets they want to keep secret, there is reason to be concerned. There could be millions, if not billions of dollars at stake. Special Solutions Ltd. has assisted many individuals and corporations, providing bug sweeps of homes, offices and board rooms. Special investigations have revealed how a company’s vendors or staff have been corrupted by a competitor into placing an illicit wireless listening device in an effort to attain proprietary information. Special Solutions has invested a half- million dollars in state-of-the-art equipment for detecting these kinds of threats. Needless to say, TSCM is big business!

Even before 911, the FBI was just trying to keep up with the increasing number of corporate espionage incidents, and electronic surveillance has now spilled over to the private sector as well. With inexpensive, wireless listening devices becoming readily available on the internet, electronic surveillance has spilled over into the private sector as well. Eaves dropping devices are being used by private individuals in instances of cheating spouses, neighborhood disputes or electronic junkies who want to get information on other individuals.

There is really no sure remedy for protecting yourself against these types of threats. You can purchase an bug-detection device through the Total Security website: www.spysource.net. You can also contact Special Solutions for a free consultation. We will conduct a thorough inspection of your business or home. However, there are no guarantee of finding a listening device. There are steps you can take to detect a bug, and there are steps you can take to prevent someone from planting one in your home or office. But everyday, criminals are getting more and more clever.

In the coming weeks, we will provide further information to help you prevent or detect illicit bugging and what countermeasures you can take to make your home or office safe. Hopefully, this will help you better understand this real-life spy vs. spy problem.

IL Concealed Carry Course

Illinois Concealed Carry Certification Classes

Chicago Firearm Training Instructors is offering certification classes for gun owners who want to be certified under the new Illinois Concealed Carry Law.

This 16 hour training course is everything you need to acquire your Illinois Concealed Carry Certification.

Cost of the course is $199.

 

Contact Chicago Firearms Training Instructors for more information:

773-775-7600

www.ChicagoFirearmInstructors.com

 

Discreet-Devices-DOMESTIC-INFIDELITY---WHAT-TO-DO-IF-THEY-CHEAT?

DOMESTIC INFIDELITY, Part 6: WHAT TO DO IF THEY CHEAT

If an investigation reveals that your spouse or loved one is indeed cheating, here are some possible steps you need to take:

  • Tell your story to a trusted family member or religious person. This is a good opportunity to vent and let off some steam. When you sit down one-on-one with a person you can trust, they can offer some emotional feedback that will help you in your time of need.
  • Get legal representation. It’s crucial for you to know your legal rights, and they can assist should you move forward with divorce proceedings.
  • If your ultimate goal is to heal your marriage, you have the evidence to confront them. In order for any marriage to work there needs to be trust. If you don’t confront them and make them come clean, it will be unlikely you will ever really trust them again.  Be judicious and diplomatic in your approach. State the facts and your intention to resolve matters. But, remember you cannot control someone else’s thoughts, emotions or intentions. It will be up to both of you to decide if reconciliation is worth pursuing. Many couples seek counseling or the advice of a religious figure in this matter.
  • Be very careful not to vent to friends that you don’t fully trust, because it might leak out to your spouse or to the general community. You don’t want to air out your dirty laundry and have it haunt you later. This is a very private thing going on your life right now, and if you do have the evidence that your spouse is cheating, it may be best to keep it to yourself for now.

In the past 25 years or more, I’ve seen people work it out, while others go down the road to divorce. This is going to be a decision you’re going to have to make. It’s a tough decision, so take as much time as you need. This is the final segment in our series on domestic infidelity, and this segment is dedicated to you. I hope all is well in your marriage and you really don’t need my services. If I can be of assistance, please don’t hesitate to call. The consultation is always free.

Discreet Devices DOMESTIC INFIDELITY - HIRING A PRIVATE EYE

DOMESTIC INFIDELITY, Part 5: HIRING A PRIVATE EYE

Consulting a private investigator is not an easy thing to do for most people. You can expect to be nervous. After all, you may be revealing some of the most intimate secrets about your married life. Rest assured, the consultation is done in the privacy of my office, and everything discussed is in complete confidentiality.

As a state-licensed professional investigator, it is my job to discover every aspect of the case in a piece-by-piece, step-by-step process to discover the truth. If there appears to be clear evidence that your spouse or loved one is cheating, we will provide the hard evidence you need to prove that your spouse is a louse.