Blog

Top 5 Signs of Covert Eavesdropping & Bugging

Are you concerned that your conversations have been compromised? Are executives in your corporation suspected potential targets of being eavesdropped on or being compromised? Are bids, financials and negotiations or your next move now out in the domain before you desire it?

by: Martin Hernandez

Below are some of the top indicators or signs that you are being bugged, wiretapped or in need of a Technical Surveillance Counter-Measures (“TSCM”) Inspection:

  1. Your confidential business negotiations, trade secrets or business activities known by people outside of your inner circle.

This is the most prevalent red flag that your company is being targeted by covert eavesdropping techniques. Are your trade secrets or ideas coming out from competitors before your release? Is the media finding out about internal memos or scheduled releases prior to their intended dates? Are labor and settlement negotiations anticipated and not productive? These rhetorical questions are designed to look for the results of eavesdropping.

The purpose of eavesdropping is to extract some usable information or intelligence that the eavesdropper can leverage for some financial, legal or political gain.  Although in violation of the law, illegal eavesdropping is a quick and exact way to accomplish the above. However, just because the effect exists, it may not be the byproduct of illegal eavesdropping. It could just be good old espionage. 

  1. Your confidential meetings, bids or internal memos are disclosed in pain staking detail.

When looking for feedback, details are the upmost importance. Disclosure of prices, specific bid provisions, contract dates, settlement or negotiation figures or the exact phrase used in a meeting are high red flags. Information is a bit like a chocolate cake. At some point, we all need to have our piece. Critical information becomes too good not to use and flaunt. So, be careful who utters such information.

Also, realize that gossip, in any form, is easily spilled from another’s lip. Many times, the disclosure of information is not from the eavesdropper but, rather a secondary person. The timing and substance of gossip can many times lead to the eavesdropping source.

  1. Your phone and communications equipment are not working properly.

Depending on the type of malfunction and noise, it may be indicative that you have been comprised by a certain method.  Have you heard volume changes or odd noise coming from your telephone? Are their popping noises, scratchy sounds, feedback, or mis-rings? These anomalies can be caused by capacitive discharge and may be the indication of line interference or the presence of a listening device. Such issues are more common with amateur eavesdropper and on older systems. However, many corporations still use older phone systems in long time occupied buildings. Not to mention the many times more successful venture of wiretapping an executive’s home as opposed to the corporate headquarters.

Are sounds coming from your headset when it is hung up? This is generally indicative that someone is listening to everything you’re saying or doing within distance of the phone receiver. Most device speakers are also in fact microphones as well.  The turning of the telephone receiver into a microphone is common wiretap method named the Hook Switch Bypass.

Do you hear faint tone, high pitched sequels/ beeps or do you hear a tone when your phone is on the hook or the phone rings and no one is there. Such noises are an indicator that a “slave” device, harmonic bug, or infinity transmitter device is being utilized.

All of these could simply be a flaw in the line, but you should still have it checked out. Understanding the exact malfunction in any system helps assist us with getting an idea of the potential method used.

  1. You have noticed odd observations, moved furniture, and unauthorized physical access not necessarily tied to your communications equipment.

Almost all illegal wiretapping involves access to the target area. Methods can include professional repeated break-ins to a home or office to conduct covert searches, scout and plant eavesdropping devices. Sometimes access can be done under a pretext. That can include unknown maintenance men, new cleaning crews or unwanted gifts which are meant to be placed in or near your office or meeting rooms.

Have you noticed caulk or paint disturbed from the wall plates or wall plate screw? Is the wall plate moved or slightly ajar? Have you noticed dry-wall dust or debris on the floor next to walls, on your desk, tv stands or other furniture? Many times, this can be indication of a hastily installed listening device or pin hole camera.

Even in modern cell phones, access must be had to the underlying software to download monitoring software. Understand that access is almost essential to eavesdropping. Any indication that unauthorized individuals have accessed your computer, phone, telecommunications closet, office or conference room can be a tip that something is amiss.

  1. You have been the subject of surveillance, dumpster diving, odd hang-up calls and other espionage.

The decision to wiretap is either made hastily out of desperation or by someone who has spent time targeting for a purpose. That being said, most illegal wiretap operations are limited in time. Sometimes, they can be preceded by other means of espionage. Those include surveillance, pretext interviews, attempts to place informants into the organization and dumpster diving through company trash. Surveilling a person or company can reveal one’s daily routine. What a person does, who that person meets up with, when a company opens, closes, when trash day is and method of disposing documents and papers from the location. Who is coming and going from the location like vendors, customers, sales persons and clients.

Carefully planned phone calls can obtain information, such as schedules, employment, personal information, company information and internal operations.  Trash pick-up and dumpster diving is a very effective a resourceful manner of obtain confidential information legally. The information that is discarded unconsciously can be a wealth of knowledge. Look for these other methods to precede a potential wiretapping attempt.

 

If you see any of the above and suspect a wiretap, contact Bearden Investigative Agency and request a TSCM (“sweep”) examination. We are well versed at privacy security evaluations and detailed TSCM sweeps. Using the latest equipment, we can identify electrical, wireless, infrared and hard-wired devices. Talk to a representative about the possibility of combining  the corporate office, satellite offices and personal residences for regular sweeps and evaluations.