RF Spectrum Analysis
Radio frequency (RF) analysis involves detecting, analyzing, and locating potentially hostile transmissions, such as those produced by room bugs and GPS tracking devices. RF spectrum analysis is a highly technical skill that requires expert knowledge of FCC spectrum allocation, signal propagation, modulation, masking methods, and direction-finding techniques.
Advanced surveillance devices sometimes use existing or rogue Wi-Fi networks to upload conversations, video, or data to a server, so it is important to analyze the Wi-Fi activity in a potential target space. Once potentially rogue access points or clients are identified, they can be located and eliminated with special tools by tracking their relative signal strength.
Wired System Analysis
Ethernet, telephone, AC, and alarm system wiring provides pathways for information to exit a room. This information can be extracted outside of the room using a variety of techniques with varying levels of sophistication. We account for all wired systems within the client space to ensure that wired systems are not being used as pathways for your information.
Ultrasonic sound can be used to secretly transmit information, cause interference to electronic systems, and harm employees when exposed at high levels (this attack method was recently used against U.S. diplomats in Cuba). Additionally, some eavesdropping devices unintentionally emit ultrasonic sound that can be used to aid in detection.
Business and residential telephone systems (analog, digital, and VoIP) are vulnerable to numerous eavesdropping methods. We electronically test individual telephone instruments, trace all wiring, and inspect on-site distribution frames and terminals for taps. bridges, RF transmitters, and other methods of compromise.
Telephone System Analysis
Clients concerned with electronic espionage often overlook a more obvious threat: acoustic leakage. Before worrying about electronic espionage it is logical to determine if your discussions can be heard in adjacent rooms or by other companies if you are in a leased space. Using a variety of tools and inspection methods, we can determine if acoustic leakage is occurring and advise on how to solve it.
Acoustic Leakage Analysis
Hidden Camera Detection
Spy cameras are used to steal passwords, read documents and computer screens during meetings, and capture people in compromising situations. Spy cameras have miniaturized considerably in recent years, but these devices retain characteristics that aid detection including transmission, heat generation, lens reflection, and the use of semi-conductor components that reflect second harmonic transmissions.
Equipment auditing is an important yet overlooked part of TSCM. A thorough audit identifies what is in a space and crosschecks it with what should be in a space. After the audit is complete, it is relatively easy to identify objects brought into the space at a later time that might serve as hosts for eavesdropping devices.
Thermal Imagery Inspection
Almost all eavesdropping devices generate a certain amount of heat when active. Thermal imagery inspections allow us to identify temperature anomalies that could indicate the presence of electronic surveillance devices. This technique is especially useful for detecting non-RF-transmitting devices.
Infrared & Laser Detection
Some eavesdropping devices use light instead of RF to transmit conversations or data out of the target area. These devices work on the principal as a TV remote control that uses infrared light to send commands (data) to a TV. These devices are strictly line-of-sight and can only be detected by using infrared optics or putting the proper light receive in the path of the light beam.
Consultations are free.
We take your privacy seriously and will never share or sell your information.
Call us: 1.206.480.1155
Contact us: firstname.lastname@example.org