Am i Bugged?

israeli_bug_2-150x150If you can answer YES to any of these questions, you may be bugged. . .

  • Your private conversations have been repeated to you
  • Your competitors have access to otherwise properly guarded proprietary or confidential information
  • Your competitors always seem to be one step ahead of you
  • You have been underbid on important contracts that you should have been a low price bidder
  • You are losing business to competitors who do not offer a better service, technology or experience

Corporate TSCM Services   Residential TSCM Services   Cell Phone Forensics

What Motivates Eavesdroppers?

Information is valuable! It can be used for personal, professional or political advantage, it can be sold, it can be exchanged and it can destroy lives and businesses. Information is power!

And, if you have access to information that is highly valuable . . the likelihood that you are a target of illegal eavesdropping increases dramatically!

How Credible is the Threat?

Serious and credible eavesdropping threats exist. Eavesdroppers are not limited by geographical, moral, ethical, or legal boundaries. The illegal eavesdropper’s goal is to obtain your information and turn it into a profit. When an illegal eavesdropper decides to target you, they have already decided that the reward for the information is much more important than the risk of being caught. Click Here to download ComSec’s free pdf ” The Threat Book” Vol 1, Issue 1. Get a first hand look at today’s Technical Surveillance Devices.

According to USLegal.com:

“The crime of eavesdropping means to overhear, record, amplify or transmit any part of the private communication of others without the consent of at least one of the persons engaged in the communication, except as otherwise provided by law. Private communications take place where one may reasonably expect to be safe from casual or hostile intrusion or surveillance, but such term does not include a place to which the public or a substantial group of the public has access. A person commits the crime of criminal eavesdropping if he intentionally uses any device to eavesdrop, whether or not he is present at the time.”

If you believe that denying you are a target or postponing a TSCM survey is a good decision, you should rethink this decision. The longer the eavesdropper has access to your valuable information, the greater the likelihood that they will actually obtain valuable or damaging information from the illegal collection activity. Trust your intuition . . if you feel that you are being collected against, there is a high likelihood that you are.

The most important question to ask yourself now is, “What can I do to minimize the damage, stop the leaks and prevent future spying attacks?” Hiring a Global Counterespionage Specialist who utilizes proven detection methodologies and equipment to perform a professional TSCM / Cyber TSCM survey is your next step. Contact ComSec or phone us today at: +1-800-615-0392

“Why Choose ComSec?”

Licensed, Insured and Certified TSCM Service Provider | USA Nationwide | Worldwide Services.

OSCOR-e1377812153657ComSec utilizes the OSCOR Green Spectrum Analyzer. OSCOR sweeps 24GHz in 1 second quickly detecting electronic surveillance devices.

1.5ghz