As long as it suits the purpose of the completion of the job at hand, it goes without saying that A D S uses the most modern technology. The use of standard technology in our work (photo, audio, video etc.) needs no special mention. When it is necessary, (in many cases the objective of an order can also be achieved without high cost observation) A D S will use the latest technology during observations.
One of the biggest risks faced by companies and individuals in public life is of their confidential business data and personal information falling unnoticed and unintentionally into the hands of third parties. It is known that confidential information is often betrayed from someone within an organisation’s or an individual’s own circle. It is also often the case however, that valuable information is stolen with the help of technical equipment. The direct consequences of such stealing are an economic loss and/or a loss of earnings or image which is often hard to assess. Spectrum analyzers (differential measurement procedure), broad band receivers for near field measurements, oscilloscopes, metal detectors, semiconductor detectors and more are all used when searching for such equipment. Professional Technicians will use these devices to search for bugging equipment hidden behind walls, above ceilings, under floorboards, and in equipment and solid matter. In individual cases and depending on requirements, the search can also be carried out with the use of thermal imaging cameras and X-Ray equipment, to be able to track down inactive technology. Please give us a call – but make sure you don’t call us from a room that needs checking! We will be pleased to help you out.
Mini spies (so-called ‘bugs’) are brought into rooms by employees, external personnel or third parties, where they are then concealed. These tiny electronic components can be hidden in almost any cavity, in suspended ceilings, in the flooring, in furniture or in other objects which are in the room such as house plants or technical equipment etc.
Bugging equipment can also easily be hidden in promotional freebies delivered by post. Almost no limits apply to the imagination of the perpetrators. Along with mini spies and telephone bugging, mini voice recorders are also used which record conversations over several hours or days. Mobile telephones also provide the possibility of ‘casually’ tape recording conversations. Modified mobile phones can also be used to listen in on conversations, even if they are look like they are switched off, and can record conversations anywhere in the world. There is also special technology such as impact sound microphones, wired broadcasting (a long wave transmitter uses the power cable as its antenna, also receiving power from the network), wired room microphones, directional microphones, laser listening technology, fax monitoring systems (all incoming and outgoing faxes are recorded), etc. It goes without saying that along with audio technology, video cameras can also be appropriately concealed. And the corresponding technology can naturally also be remote controlled. With today’s technology becoming ever smaller, almost anything has become possible. A detailed description of all of the possibilities would simply take up too much space. An internet search with the appropriate key words and phrases yields an almost unlimited amount of information.
As a rule, the circle of so-called ‘secret carriers’ at an organisation must be kept as small as possible. It goes without saying that the carefree handling of sensitive data and information is not possible.
It should be ensured that rooms in which sensitive information is stored are not accessible to ‘everyone’. Meeting rooms should provide as few options as possible for the concealing of bugging devices (plants, equipment etc.). Mobile phones and/or dictation equipment (which are sometimes disguised as key rings!) should not be allowed in meeting rooms. Construction related steps (sound insulation etc.) can also provide a certain amount of protection. The external maintenance of IT or telecommunications systems by third parties should be avoided at all costs. As a preventative measure, along with the appropriate protection measures, regular anti listening device checks can also be carried out to deter potential offenders. After it has been ascertained that an unexplained outflow of information is occurring, decisive steps (technical and non-technical checking of suspected rooms and also the possible checking of suspected persons) must be completed without delay.