Bug Detection Services and Wire Tap Detection|TSCM Solutions North Carolina

Bug Detection services by Advanced Technology Investigations an Expert Digital Countermeasures (TSCM) Bug Diagnosis and Wire Tap Detection Firm centrally found in Greensboro, NC. A Specialist TSCM sweep supplies effective bug detection solutions and wire tap detection for technological sound interception, online hacking, and data eavesdropping devices such as radio transmitters (analog, electronic, infinity jumping, burst, and spread spectrum), provider current transmitters, light transmitters, laser device strategies, hidden cameras, fiber optics, telephone system taps, line instrument taps, regional and large location networks and unapproved intercept points, facsimile intercepts, wired microphones, and numerous other digital security intrusion techniques. Below are actions taken in a typical TSCM sweep conducted by ATI. The depth of the sweep could differ on the threat to each Client. In addition to the sweep procedures here, ATI can sweep automobiles and plane for tracking devices as asked for by our Clients.

ATI’s Owner, has 26 Years of Hands on Experience in the Electric / Electronic devices Career and Extensive TSCM Training by several of the Elite TSCM Companies in the UNITED STATES. Our Agency is trained and Certified in Spyware Detection and Removal for Computers, Cell Phones, and Cyber Stalking, if this solution is needed in your circumstance. Call us today, to discuss your necessities for an Expert Electronic Countermeasures Sweep.

Regular Treatments to adhere to in a TSCM Sweep:

1. Have Customer Start a Secure Contact with ATI.

  • Get in touch with us made away from suspicious facility (pay phone at flight terminal, Office building land line, good friend’s phone)
  • Call is not made by means of a suspect telephone, cord-free, or mobile telephone.
  • Preliminary plans for safe face-to-face meeting and assessment.
  • Gather info and materials regarding suspicious activity.

2. Initial Meeting with Client.

  • Preliminary conference at a distant location far from any sort of suspect center.
  • Conversation concerning customers issues, and susceptabilities.
  • TSCM sweep plan discussion.
  • Make strategy in case an eavesdropping device or threat is located.

3. Pre-Inspection Survey, Study, and Facility Reconnaissance Activities.

  • Testimonial of facility plans and stroll with.
  • External RF survey.
  • Facility exterior reconnaissance.

4. Susceptability Evaluation Examine.

  • Risk analysis.
  • Bodily protection assessment.
  • Digital security evaluation.
  • Internal RF survey.
  • Audit of communications technologies and centers.
  • Inventory of home furnishings, installations, and artifacts.
  • Assessment of architectural components (wall surfaces, ceilings, floorings)
  • Sketch of suspect location and facilities.
  • Identification of sensitive areas.
  • Recognition of intercept places.
  • Recognition of possible listening closely articles.
  • Development of hazard design.
  • Executed during normal workplace hours (with proper cover)

Private Investigator Greensboro NC logo

5. Silent/Passive Walk-Thru Examination.

  • Non alerting activities only, absolutely nothing to alert the eavesdropper.
  • Automated insect and cordless microphone detection. (1MHZ to 3 GHz)
  • Preliminary VLF assessment of all HVAC, telecom, LAN, HVAC wiring, safety,. Fire Alarm, Intercom Systems.
  • Initial detection of infrared devices and laser surveillance devices.
  • Video camera, tape recorder, VLF, and ultrasonic detection.
  • Overt threat detection.
  • Initial evaluation of physical security, locks, alarms, etc…
  • Most amateur bugs will be detected during this phase.
  • TSCM services above this level starts radically increasing in cost.

6. Passive Inspection – RF and Light Spectrum Detection.

  • No noise and non alerting activities only, nothing to alert the eavesdropper
  • Spectrum Sweep with soft music playing.
  • Passive RF spectrum sweep.
  • Passive light spectrum sweep.
  • Most advanced and amateur bugs will be detected during this phase.

7. Active Inspection – Non Alerting.

  • Minor Noise is created, however; it should not alert the eavesdropper.
  • VLF/RF check – AC mains (all electrical outlets)
  • VLF/RF check – AC mains (all light switches/fixtures)
  • VLF/RF check – HVAC controls
  • VLF/RF check – Alarm and access control sensors
  • VLF/RF check – Fire and safety sensors/alarms
  • VLF/RF check – Other
  • All phone lines evaluated and traced back to central office
  • All artifacts documented, recorded, and inspected
  • Oblique lighting inspection of all walls and artifacts
  • Initial inspection of baseboards, windows frames, and door jambs
  • Initial inspection of all wallplates (electrical, PBX, LAN)
  • UV lighting sweep (below 400nm / 100THz)
  • IR lighting sweep (above 700nm / 180THz)
  • Tuned forensic light source and filter sweep.
  • Check for telephone set modifications/problems.
  • Check for PBX software and hardware anomalies.
  • Check for voice mail modifications/problems.
  • Inspection of all computer and LAN connections.
  • Inspection of all laser printers and computer output devices.
  • Computer Scan to detect Root Kits, Key loggers, Spyware, Malware ect….
  • Professional bugs and eavesdropping can be detected during this phase.
  • Typical threat level for most corporate offices

8. Active Scan – Alerting

  • Noise detection of hidden microphones and other transducers
  • IR, audio, and ultrasonic jamming (as required)
  • Render the eavesdropping device temporarily inoperative
  • Inspection of all furnishings (desks, chairs, plants, etc)
  • Open ceilings and walls (move ceiling tiles and panels)
  • Thermal inspection
  • HVAC and duct work inspection
  • Acoustical leakage inspection
  • Borescope inspection of all electrical wallplates and boxes with suspect anomalies found.
  • Detailed inspection of all lighting fixtures.
  • Inventory of all conductors, conduits, wall studs, etc…
  • Detailed electromagnetic energy search (above 110 GHz)
  • Professional eavesdropping devices can be detected during this phase.
  • Typical threat level for a Fortune 500 corporate offices and law firms

9. Active Scan – Alerting/Evaluation

  • Map, Analyze, TDR, trace all conductors for all systems.
  • TDR trace – Telephone System Wiring
  • TDR trace – Computer Network Wiring
  • TDR trace – Cable Television and CCTV
  • TDR trace – AC mains (all electrical wiring)
  • TDR trace – AC mains (all light switches/fixtures)
  • TDR trace – HVAC controls
  • TDR trace – Alarm and access control sensors
  • TDR trace – Fire and safety sensors/alarms
  • TDR trace – Other
  • PBX, ESS, and SN translation evaluated (as available)
  • Voice mail system evaluation
  • Copy machine inspection
  • Fax machine inspection
  • Verify security of PBX, alarm, HVAC, audio systems
  • Evaluate all artifacts (ie: furniture, books, computers, etc…)
  • Wall, floor, and ceiling cavity inspections
  • Intense physical inspection (every cubic centimeter)
  • Diplomatic, law enforcement, and intelligence devices detected at this phase
  • Typical threat level for high level firms.

10. Special TSCM Activities (used only as needed)

  • Non Linear Junction Detector (NLJD) inspection – active and passive.
  • X-ray, radiographic, and fluoroscope inspection.
  • Magnetic anomaly inspection.
  • Thermal Imaging.

11. Preventive Privacy Invasion Actions.

  • Client education on vulnerabilities from conducted threat assessment.
  • Recommendations for Client on Preventative Measures.
  • Additional Services as approved and requested by Client.

12. Post Inspection Activities

  • Verbal presentation of findings before leaving.
  • Presentation of hard copy report (if requested in writing within 30 days)
  • Corrective actions.
  • Follow up actions upon Client request.
  • Recurring TSCM services upon Client request. (As needed)

13. What to Expect When a Eavesdropping Device or Activity is Detected.

  • Collection of documentation regarding device or activity
  • Notification of Law Enforcement Agencies (When appropriate)
  • Forensic Identification and Analysis of Device
  • Counter-surveillance activities scheduled with Client
  • Counter-intelligence activities scheduled with Client

General Summary:
Advanced Technology Investigations recommends Sweeping at least the following,on every job unless directed otherwise by the Client. (except for brief “Walk Though Inspections”):

  • Analysis of all RF/electromagnetic fields.
  • Inspection of all outlets, switches, and lighting for VLF/RF devices.
  • Inspection of all PBX, LAN, and WAN connections and equipment.
  • All computers audited and checked for security anomalies.
  • Evaluation of all computers network facilities and associated cabling.
  • Inspection of all Copy, fax, and other imaging equipment.
  • Inspection of all fiber optic connections and cabling.
  • All phone lines inspected and verified back to the central office.
  • Evaluation of all locks, safes, and physical security devices.
  • Intense Physical Search of exterior and interior areas and artifacts.
  • Most activities will overlap to provide complete coverage.