Intellectual property protection & IP investigations

Intellectual Property

Intellectual Property Protection

A patent that protects inventions, machines, computer software, technology.

A trademark that secures branding elements for marketing campaigns, logos, slogans, and taglines.

Copyright that covers the original work in music, arts, photography, designs, and other creations.

Our Intellectual Property investigation will look into:

  • protection of your intellectual property
  • trademark protection
  • copyright protection
  • patent protection
  • brand protection
  • counterfeiting issues
  • trademark infringements
  • piracy & misleading consumer information
  • fraudulent use of your brand identity
  • design infringement investigation
  • parallel trade investigations
  • grey market investigation
  • market surveys
  • IP due diligence
  • IP litigation support services
  • Geographical indication investigation
  • investigate products or services that claim ownership of your brand or logo or system
  • check if fake goods/products are trying to pass off as your real products/goods

IP breach identification and mitigation

Intellectual property investigations are needed to ensure that IP breaches are identified and mitigated. Thus you can avoid more financial losses, reputation, or brand damage.

Request for an Intellectual Property Investigation

Due Diligence Investigations

due diligence investigations

Due Diligence

As a private investigator and risk management company we conduct due diligence investigations on a regular basis. It is important to exercise care that you as a reasonable business or person is expected to take before you enter into an agreement or business contract with another party. You always need to act with a certain standard of care. This could even be a legal or ethical obligation.

Our due diligence process will allow you:

  • have more confidence in your business decisions
  • engage confidently with new business partners
  • enhance your business operations

  • use the gathered intelligence

We can assist you with:

  • setting up smart due diligence reports
  • getting deep analytics insight in issues that matter for your business
  • risk assessment in general
  • corret understanding of the regulary frameworks
  • avoid loss of reputation
  • prevent financial losses
  • evaluating a company its assets during acquisition or take-over

We work in the 9 areas of due diligence processes:

  • Compatibility audit
  • Financial audit
  • Macro-environment audit
  • Legal/environmental audit
  • Marketing audit
  • Production audit
  • Management audit
  • Information systems audit
  • Reconciliation audit

During this auditing process, we will inspect your accounts and act as an independent body. The purpose of the audit will depend on the situation. But there will always be a detailed on-site verification, in-depth inspection, and extended examination. At the same time, a good look will be taken at business processes & the quality of systems. In particular, we need to verify your compliance with legal or other requirements in your industry or sector. Audits are applied to your entire organization or could focus on a specific function, a business process, or a production process.

Inquiry Due Diligence

Corporate Fraud Investigations

[ Types of Fraud ] [ Asset Misappropriation ] [ Vendor Fraud ] [ Accounting Fraud ] [ Payroll Fraud ] [ Data Theft ] [ Bribery & Corruption ] [ Fraudulent Activities ]

CORPORATE FRAUD

AR INTELL provides investigative services into Corporate Fraud. We assist with determining the complexity of the detected fraud, who is involved, and what methods were used. To do this we perform different types of corporate investigations to gather relevant evidence. We advise also on how to identify & recover assets. Avoiding future losses is key; doing in-depth risk assessments & risk management can help with fraud prevention and fraud detection.

DIFFERENT TYPES OF CORPORATE FRAUD

Asset Misappropriation – Theft of Company Assets by an employee

  • cheque forgery, illegal cheque without (kiting)
  • tampering with cheques
  • inventory theft (physical assets)
  • theft of cash
  • theft of physical assets
  • expense reimbursement fraud
  • expense account fraud
corporate theft

Is money being stolen from the company accounts?

  • procurement fraud
  • payment fraud on vendor/customer accounts
  • workers compensation fraud
  • health or medical insurance fraud – cheating healthcare providers to defraud an insurance company
  • sales commission fraud – false sales to get a higher commission
  • personal use/abuse of company Vehicle – unauthorized activities

Vendor Fraud – Supply Chain Fraud

  • verify if employees and vendors acting alone or “in cahoots” with each other
  • billing schemes – false payments, fictitious vendors, shell companies, manipulating accounts
  • bribery and kickbacks – getting payments in exchange for an advantage
  • check tampering – forgery, alteration, or use of unauthorized checks
  • overbilling by vendor
  • price fixing
corporate fraud

Is money mis-appropriated to vendors or suppliers? Are there kick-back deals in place?

 

Accounting Fraud

  • manipulation of the company’s accounts with little or no oversight
  • embezzlement – larceny
  • accounts payable fraud
  • accounts payable fraud – easy fraud to perpetrate
  • fake suppliers – billing companies with fake invoices
  • personal purchases
  • double-checking fraud
  • accounts receivable fraud – lapping – fake sales – skimming money
accounting fraud

Are your accounts being manipulated? Are the books being “cooked”?

Payroll Fraud

  • ghost employee schemes – fake employee or ex-employee on the payroll
  • advanced salary fraud
  • timesheet fraud – inflated or unexisting hours, clocking for other workers i
  • paycheck theft
wood businessman man woman

Is there a possibility of payroll fraud?

Data Theft – Digital Fraud

  • Theft of intellectual property
  • Theft of personally identifiable information
  • Theft of other confidential information
  • Trade Secret Theft
  • Theft of proprietary information
  • Theft of Customer List or Contact Lists
  • Theft of Personally Identifiable Information (PID)
  • Theft of credit card numbers
  • Theft of client lists
  • Theft of valuable PID
data theft

How much of your data is stolen or copied without your knowledge?

Bribery & Corruption

  • high profile frauds
  • corporate kickbacks
  • bribes (illegal advantages for employees)
  • unauthorized discounts.
  • shell company fraud
  • money laundry
  • assets diversion
  • tax evasion, tax avoidance
  • product substitution (purchasing bad or fake products different from what was agreed
bribery

Is money being taken “under the table”?

Other fraudulent activities

  • abuse of trust
  • conspiracies
  • money laundry
  • extortion (*)
  • racketeering

The types of fraudulent activities that we investigate always use deception in order to make a personal gain in a dishonest way, hence creating a loss for another party. If you want to prevent such unforeseen losses, an investigation can help you prevent unneeded suffering in the near future.

INQUIRY CORPORATE FRAUD

Risk Assessment

assess risk, deal with risk, risk investigations

Potential Risks

We look at Risk Assessment as the systematic process whereby we evaluate the potential risks that may be involved in a specific projected activity or any type of undertaking. Our methods focus on risk analysis & and risk evaluation.

We perform an assessment of the risks in relation to:

  • Identifiable hazards or roadblocks
  • clear or not so clear risk factors that can cause harm
  • risks associated with those hazards
  • Risk Elimination: methods of elimination of the hazard
  • Risk Control: ways to control the risk (if the hazard cannot be eliminated)

Request Free Risk Assessment

Private Investigators Turkey

Private Investigations
Turkey

With one of our AR INTELL regional offices based in Europe, Netherlands we are quite able to do private investigations or assist in private investigative services in Turkey.

Turkey
Private Investigators

Our AR INTELL specialized private investigators and risk management consultants can cover private investigations over the entire Turkish in all geographical areas of Turkey and all major cities such as Istanbul, Ankara, Izmir, Bursa, Gaziantep, Konya, Antalya, Mersin, Kayseri, Eskisehir, Urfa, Malatya, Erzurum, and Samsun.

Request Free Consultation or Assessment - Turkey

Private Investigators Egypt

As a company AR INTELL can thanks to it’s extensive global network of private investigators & private detectives assist you with private investigations and other global risk management issues across all states & Regions in Egypt (the country of the great Egyptian Pyramids). 

Egypt Private Detectives

 

Egyptian States, Cities covered by AR INTELL: Al Qāhirah (Cairo), Al Iskandariyah, Al Jīzah (Giza), Al Gharbīyah, Qinā, Bur Sa’id, Asyūţ, As Suways, Ad Daqahlīyah, Al Fayyūm, Al Isma’iliyah (Ismailia), Maţrūḩ, Al Qalyūbīyah, Banī Suwayf, Aswān, Sūhāj, Al Baḩr al Aḩmar, Al Minyā, Dumyāţ, Al Buḩayrah, Kafr ash Shaykh, Al Minūfīyah, Ash Sharqiyah, Janub Sina’, Shamal Sina’, Al Wādī al Jadīd.  Luxor. Sharm el Sheikh.  Aswan.  Hurghada. Siwa Oasis. Port Said. Kharga Oasis. Dahab. Edfu. Dakhla Oasis. Kom Ombo. 

river Nile, Egypt, private investigators

Private Investigations

We approach all our investigations with absolute confidentiality and discretion. Our team of professional investigation officers have unique investigative skills. We operate within the provisions of the legal framework and relevant laws.
| Surveillance | Matrimonial Investigations | Catch Cheating Spouse | Family Case | Asset Tracing | Co-habitation | Fraud Claims | Background Investigation | Background Check | Missing Persons | Life Style Checks | Under Cover Operations | Computer Forensics | Digital Forensics | Mobile Forensics | Smart Phone Analysis | GPS Tracking | GEO Location |

Corporate Fraud Investigations
Corporate Intelligence
Computer Forensics & Cyber Security
Security Risk Management & Risk Assessment

 

Request Free Consultation or Assessment - Egypt

Vietnam Private Investigators

vietnam private investigators

With one of our AR INTELL offices based in Ho Chi Minh City in Vietnam we are able to conduct or assist in different types of private investigations in the country of Vietnam in all provinces and cities.

An Giang Province Long Xuyên Mekong Delta
Bà Rịa-Vũng Tàu Province Bà Rịa Southeast
Bắc Giang Province Bắc Giang Northeast
Bắc Kạn Province Bắc Kạn Northeast
Bạc Liêu Province Bạc Liêu Mekong Delta
Bắc Ninh Province Bắc Ninh Red River Delta
Bến Tre Province Bến Tre Mekong Delta
Bình Định Province Qui Nhơn South Central Coast
Bình Dương Province Thủ Dầu Một Southeast
Bình Phước Province Đồng Xoài Southeast
Bình Thuận Province Phan Thiết South Central Coast
Cà Mau Province Cà Mau Mekong Delta
Cần Thơ City Ninh Kiều District Mekong Delta
Cao Bằng Province Cao Bằng Northeast
Đà Nẵng City Hải Châu District South Central Coast
Đắk Lắk Province Buôn Ma Thuột Central Highlands
Đắk Nông Province Gia Nghĩa Central Highlands
Điện Biên Province Điện Biên Phủ Northwest
Đồng Nai Province Biên Hòa Southeast
Đồng Tháp Province Cao Lãnh Mekong Delta
Gia Lai Province Pleiku Central Highlands
Hà Giang Province Hà Giang Northeast
Hà Nam Province Phủ Lý Red River Delta
Hà Nội City Hoàn Kiếm District Red River Delta
Hà Tĩnh Province Hà Tĩnh North Central Coast
Hải Dương Province Hải Dương Red River Delta
Hải Phòng City Hồng Bàng District Red River Delta
Hậu Giang Province Vị Thanh Mekong Delta
Hồ Chí Minh City District 1 Southeast
Hòa Bình Province Hòa Bình Northwest
Hưng Yên Province Hưng Yên Red River Delta
Khánh Hòa Province Nha Trang South Central Coast
Kiên Giang Province Rạch Giá Mekong Delta
Kon Tum Province Kon Tum Central Highlands
Lai Châu Province Lai Châu Northwest
Lâm Đồng Province Đà Lạt Central Highlands
Lạng Sơn Province Lạng Sơn Northeast
Lào Cai Province Lào Cai Northeast
Long An Province Tân An Mekong Delta
Nam Định Province Nam Định Red River Delta
Nghệ An Province Vinh North Central Coast
Ninh Bình Province Ninh Bình Red River Delta
Ninh Thuận Province Phan Rang–Tháp Chàm South Central Coast
Phú Thọ Province Việt Trì Northeast
Phú Yên Province Tuy Hòa South Central Coast
Quảng Bình Province Đồng Hới North Central Coast
Quảng Nam Province Tam Kỳ South Central Coast
Quảng Ngãi Province Quảng Ngãi South Central Coast
Quảng Ninh Province Hạ Long Northeast
Quảng Trị Province Đông Hà North Central Coast
Sóc Trăng Province Sóc Trăng Mekong Delta
Sơn La Province Sơn La Northwest
Tây Ninh Province Tây Ninh Southeast
Thái Bình Province Thái Bình Red River Delta
Thái Nguyên Province Thái Nguyên Northeast
Thanh Hóa Province Thanh Hóa North Central Coast
Thừa Thiên-Huế Province Huế North Central Coast
Tiền Giang Province Mỹ Tho Mekong Delta
Trà Vinh Province Trà Vinh Mekong Delta
Tuyên Quang Province Tuyên Quang Northeast
Vĩnh Long Province Vĩnh Long Mekong Delta
Vĩnh Phúc Province Vĩnh Yên Red River Delta
Yên Bái Province Yên Bái Northeast

 

Request Free Consultation or Assessment - Vietnam

GPS Tracking – GEO location of targets and subjects

tracking GPS

What is GPS Tracking?

GPS-Trackers are devices which determine location and other data and send it to a GPS server. Most of the times, you will have an app that allows you access these data and see them in a useful way. Many modern cars have already built-in GPS tracking technology. Older cars can be provided with GPS tracking devices.

gps tracking map

In some cases a private investigation will warrant, or require the use of GPS Tracking Technology.

As AR INTELL Private investigators we use GPS tracking systems to help us in our investigations:
 
 
  • locating a person
  • location tracking vehicle
  • location track on property (physical items)
  • location track on mobile devices or laptops (even desktop computers or servers inside a building)

Thanks to this modern GPS technology platform, we also don’t to wait in a car for endless hours to verify or record how long a suspect was in a specific location. Tailing or following suspect has become much more easier also.  Take note that we always operate within the law and mandate of a private investigations.

A very essential part of GPS tracking is the reporting, the summary and the analysis of the data in a comprehensive format.

Request GPS Tracking

Bug Sweeping – Technical Surveillance Counter Measures – TSCM

[ Bug Sweeping ] [ Spy Bugs ] [ Red Flags ] [ TSCM ] [ Physical Inspection ] [ Office Inspection ] [ Radio Frequency Detection ] [ Audio Recordings ] [ Surveillance Target ] [ Counter Measures ] [ TSCM Equipment ] [ Inspection of Computers & WiFi ] [ Professional Bug Detection ]

Who is watching?

Who is listening?

Who is recording?

What is Bug Sweeping – Technical Surveillance Counter Measures – TSCM?

Who is listening to your conversations? Who is watching you?

In today’s day and age, we can’t too careful with our information and who has access to it. Once the information has been exfiltrated or extracted via cyber espionage and other techniques, it can and will be used against your own interest.

The phrase “I have nothing to hide” or “I am not important” might be true in some cases, but it does not address the real problem of eavesdropping or corporate espionage and neither does it acquit or absolve you from your responsibility as a company, government or corporation to protect the data that you have collected and stored.

Low-Cost Hidden Surveillance

Hidden surveillance equipment is very easily available at a low cost for anybody. And it can be very small, easy to hide, and hence difficult to find or track.

How to main privacy and secure your premises?



This causes a challenge to maintain the privacy, confidentiality, and security of our premises, offices, and other places. After all, you don’t want to be spied upon or monitored by adversaries, competitors, or corporate spies. Just think about hidden voice recording devices (even smartphones) present at your meeting without your knowledge or consent…

TSCM – Technical Surveillance Counter Measures

Electronic Spy Bugs

TSCM is basically the counter-surveillance specialty called Technical Surveillance Countermeasures or TSCM is referring to a set of countermeasures with as purpose of the detection and/or defeat of technology, spy bugs, and electronic devices which try to obtain intelligence (video, audio, data, etc.. ) of a target (person, location, meeting room).

Eavesdropping on audio, video, location, and Wi-Fi systems.

Also known as eavesdropping by using advanced audio-, video recorders, GPS trackers, logging systems, and electronic transmitting devices using different frequencies. To detect or counter these threats you need to hire a debugging team to do technical sweeps or bug sweeping.

 

Spy Bugs come in different sizes & shapes

 

You might also consider awareness training for your staff, so their relevant person is knowledgeable about electronic devices, such as spy-bug, GPS trackers, data loggers, motion-activated sensors, and other methods which adversaries of spies will use to either follow you, record you, track you, monitor your movements or listen into your private and confidential meetings. These types of devices are getting smarter & cheaper:

  • a SIMCARD enabled (GSM) in double plug socket transmitter will work for many years (global)
  • an unregistered or copied sim card could be used in these types of spy devices
  • hardwired RF devices were hidden in an existing and functioning electronic device
  • devices programmed to disable themselves upon scanning
  • devices with masked heat and RF signature
  • nano-technology enabled devices (very small)
  • frequency hopping devices are more difficult to detect

Office Inspection

TSCM Physical Inspection of offices or meeting rooms

Are there spy bugs hidden in our office?

 

Seeing what could be hidden where, think like a spy, and imagine where to hide the listening device. That is what you need to do in order to find the device. Make a list per room/office of where things could be hidden. This starts with an on-site physical and visual assessment followed by a deeper inspection. Don’t avoid a hard search. Don’t think that you are smarter than the spy. The best way to detect bugs is to think like the spy who is placing the eavesdropping devices. Theory alone does not cut it. Hands-on experience is key.

When should I check for listening devices?

 

These kinds of inspections will have to be done routinely. Especially before and after the meeting you might want to check the room.

Since bugs are physical devices, they will have been brought into the building or office at a given point in time. People who install bugs or plant covert listening devices will have thought about:

Are my security staffs able to detect hidden recording devices?

  • ROI – Cost vs reward – which type of technology or electronics
  • how to power the device? hardwired or mobile devices?
  • methods of retrieval?
  • can the device be jammed?
  • can the device be detected?
  • is the security staff aware of spy bugs?
  • frequency hopping device or simpler??
  • level of risk to get caught during installation, activation, or operations
  • which type of building is being bugged (steel, concrete, or brick)
  • the exact location of the target room/area?
  • the timescale of the monitoring sequence – when to activate or use the device? what triggers it?
  • monitoring or receiving location (what type of transmission)
  • audio, video, motion sensors, still -images – what type of data was collected?
  • how to gain access to room/area and building

Are you the target of Surveillance?

Are you being followed or spied upon?
Are you a target? Spot the Red Flags or Indicators.

Typical signs of the presence of hidden surveillance or listening/bugging devices (spy bugs) are:

  • random interference in radio and television or other audio/video devices (radio frequency)
  • uncommon noises, beeps, cracks on fixed (PSTN) phone lines
  • mobile phones and smartphones batteries run out fast, even when not in use.
  • unexplained burglary or signs of burglary without theft. Did somebody put a device in your office?
  • traces of holes drilled in walls.
  • check if certain items that you received are not bugged with something.
  • an indication that certain confidential information is leaking out and popping online or in conversations.
  • effective signs that you are losing information or data
  • presence of hidden (undiscovered) eavesdropping and monitoring devices

Risks of Spy Bugs

Risk of spy-bugs doing audio or video surveillance in your organization/company.

  • company loss of vital commercial information
  • reputational damage
  • bad public relations if exposed in the press
  • loss of profits
  • the leak of intellectual property
  • lack of privacy creates a distinct feeling of insecurity
  • issues of data-leaks
  • unauthorized transmission of confidential info to unknown parties
  • lack of confidentiality, integrity & accessibility of info (CIA)

What can be done with recordings? How can this hurt me?

Inspection of Wi-Fi & Computers

Spying via WiFi devices and computers in your office

It is wise to include a WiFi sweep (hidden and visible WiFi access points) in the TSCM survey. Computers have microphones and are frequently bugged via the operating system or all sorts of apps that might be installed. Most Internet devices are connected online 24 hours per day, 365 days per year. Do you know what is connecting to your network or own device? In many cases even experienced IT admins are aware of this issue of cyber attacks but have not learned in-depth or have not been confronted with the audio-spy-bug technology from hardcore cyber-spies. This is the blind spot, this is the weakness.

It is not enough to just scan for known or current threats. Be aware also of future threats.

Radio Frequency Detection

Detection of Radio Frequency Devices

Are there any unwanted radio frequency devices in your building or office?

It cannot be stressed enough that physical security & building security (on-site, in your premises, your offices) are not enough to secure premises from interfering radio frequency devices. You will also need to look at the latest threat intelligence relevant for your organization and company on data breaches, data leaks, cyber attacks, ransomware attacks, whether your company data is being sold on the dark web, and if your WiFi routers are bugged, hacked or tapped.

Enumerate all devices

Make a list (enumeration) of all office devices which are connected to the internet and your local area network, maybe they are bugged with spyware or simply hiding in plain sight containing hardware spy bugs. There are many types of covert transmitters.

  • 1st we create an RF spectrum footprint of the area
  • 2nd we examine RF spikes (classification: safe / not safe / not authorized / not recognized)
  • 3d check for  hidden hard-wired microphones and covert video cameras (phone handsets and sockets)
  • 4th physical and technical inspection of electrical devices
  • 5th check of telecommunications and Computer systems (routers, devices, cables, etc..)
  • 6th inspection & scanning of walls, floors, ceilings, ducts (hidden, redundant items, or suspicious wiring)

Integrated approach

This will require an integrated approach and this is where TSCM is maybe the start of a much bigger security policy to be put into place…  If you see red flags or symptoms, don’t ignore them.

Do Call our AR INTELL TCSM team and we will start the initial assessment. After our TSCM process is completed a report is made about your security routines, bugs discovered, possible weaknesses in your system, and recommendations are formulated. In some cases, we recommend to re-train your security management team & staff.

Unauthorized Audio Recordings

Counter Measures to jam or avoid Audio Recordings

There are devices on the market that will alert you when new RF signals are activated or detected, or audio-jamming systems that make the recorded sound, appear inaudible. A microphone jammer could be a way to protect your privacy and keep private conversations private.

  • Audio Recording Jammers are a type of white noise generator that can keep your conversation from bugging devices. This device will create random sound waves that desensitize nearby audio surveillance devices. Top confidential P&C meetings should NOT be conducted without a professional audio jammer. These types of jamming devices will generate a signal which jams the microphones of recording devices. Recordings will be inaudible. Audio Recording Jammers will shield your conversation from recording apps on Mobile phones, Laptop Computers, digital recording pens, (hidden) recorders, and any other device for sound recording or acquisition. An audible white noise on a specific audio frequency will disable the microphone’s recording capabilities (if in range). Audio jammers are not wireless RF frequency jammers. Most of this audio jamming technology will desensitize a nearby microphone or tape recorder. They can be an effective countermeasure against microphone-based surveillance devices such as tape recorders, RF transmitters, microphones, and microwave or laser reflection listening technology.
  • Ultrasonic Suppressors use ultrasonic emitters. When turned on the microphones of recording devices will not allow interlocutors to record confidential information. This device works silently and is installed under the table.
  • Audio Signal Generators will generate an audio frequency that interferes with the audio-recording device.

TSCM Bug Sweeping

TSCM Bug Sweep. Detection of Hidden Devices.

  • electronic and physical check
  • inspection of a room (+ content)
  • check building security, perimeter area
  • check vehicles in which targets are moving (GPS trackers, audio bugs, “forgotten” phones)
  • inspection of common areas, toilets, and restrooms. lifts and refreshment areas, kitchen
  • FM & UHF device’s radio signal
  • GSM, smartphone device usage (3G,4G)
  • differentiate legit/authorized mobile phones/smartphones and 2G/3G/4G or GSM bugging devices
  • detection of burst transmission
  • presence of encrypted devices
  • cyber attacks on computer systems
  • presence of spyware, malware in desktop/laptop computers and other mobile devices
  • look at the electrical systems
  • check the telephone systems, communication-systems
  • video & audio-conferencing systems
  • information desk telephones, telephones on reception-desk could be listening devices
  • provide training and education to the management team and/or key security personnel
  • check electrical systems, lights
  • check thermostats or aircon-remote controller
  • check how many power sockets, power plugs, workstations, laptops, computers are in a room
  • check ducting (HVAC systems), fans, air-cons, remote controls, etc.
  • check electrical fittings and sockets
  • check topography, the layout of the building & office
  • perimeter & access security
  • devices embedded within walls, behind wallpaper
  • devices embedded in the structural elements of a room
  • bugs embedded in soft furnishings, couches, and other furniture
  • inspection of laptops, tablets & smartphones that executives & directors use (including home devices)
    • could be bugged
    • could be tracked
    • could be infected with spyware, malware, ransomware, etc.
  • inspection of computer-case, laptop-case (ideal for putting bugs & trackers)
  • check pc motherboards, wiring & electronics of computer internals (desktop cases should be locked)
a man touching an electronic equipment with electronic signal

Look for hidden recording devices and transmitters. Contact professional bug-sweepers.

Is bug-sweeping an intrusive service?

You should also be aware that a TSCM sweep can be a very intrusive service so it needs to be done correctly. One simply cannot trust just any sub-contractor to conduct this kind of service. After all meeting rooms and offices of all employees, executive directors, partners, and personal assistants will be swept for bugs. Some preparation is required here.

Sometimes the nature of the environment will require the bug sweep to be done covertly, at night, or during off-peak times of office usage. TSCM teams could enter the building at night when there are no or fewer office workers/employees in the building or office.

TSCM Methodology

TSCM Equipment

What type of TSCM Equipment is used? Which TSCM methodology? And for what purpose?

Depending on the assignment and scope of work, different types of sophisticated Radio Frequency enabled scanning/detection equipment and other systems will be used to detect suspicious transmissions. When inspecting a room, office, or specific area, devices that scan RF in the NEAR field are required. We are not looking for phantom signals or RF reflections from far away emitting sources. Any signal detected is considered a suspect, until it is identified for what it is (strength of RF, frequency, source, benign, or something else). RF Devices-list:

  • Spectrum analyzer
  • Oscilloscope
  • RF device sweepers for RF range from 10 kHz to 24GHz
  • Handheld close-inspection devices
  • GPS signal scanners
  • Walkie talkies give some idea of certain UHF, VHF chatter nearby
  • Physical and technical inspection devices and hands-on feeling and looking
  • Non-Linear Junction Detector (scans for passive devices)
  • Thermal imaging cameras
  • Infrared detection devices
  • GSM/UMTS/3G/4G detection and location system to identify the IMEI of the SIM card (IMSI scanner)
  • Detection of active SIM-based surveillance devices
  • Endoscopes with cameras
  • Frequency Domain Reflectometer (FDR) to check the integrity of the cables (any splits or wiretaps?)
  • Counter Surveillance Probes
  • Radio Microphone Detector to detect clandestine radio microphones
  • UV-light to detect excessive fingerprints on windows and other smooth surfaces
  • Different equipment to check for tampering with legit installations
radio frequency spectrum

What type of signals to look for in the radio-frequency spectrum?

Drop devices (drop & retrieve method) or burst devices (gathers intelligence, does audio/video recording + does a scheduled transmission of these data) require a different method of detection (thermal imaging, XRAY-scan) since they are not always transmitting but do have a battery, electronics, and an antenna. Burst transmissions are mostly done during off-peak times. Signals can be analog, digital, or burst signals.

professional radio frequency detection

Professional Bug Detection

Cheap Solutions don’t really work…

Take note that a cheaper radio frequency detector (detect RF presence close, but also far and wide..) is not the same as a professional bug detector (detects RF bugs in a specific area).

There are many radio signals and RF-enabled devices surrounding us. Such as FM, AM radio, UHF, VHF walkie talkies, Bluetooth devices, Wi-Fi (routers running on 2.4 GHz, 5.8 GHz), (2G, 3G, 4G, 5G, IoT-frequency, GPS signals in phones or cars, utility meters, telecom towers, laptops, smartphones, baby-monitors, IoT-devices, Tablets, Bluetooth headset/speakers, smart-watches, electric motors of vacuum cleaners, metal curtain-rods, automatic curtain systems, projectors installed in ceilings, conference systems on tables… Sometimes you will detect these signals and some of them are false positives (phantom signals).

The summary is that there are radio signals everywhere. Detecting a radio frequency is one thing, but in TSCM it is key to know where the emitting signal is coming from. Meaning, you need to locate the source; find the location. Radio signals tend to bounce off surfaces and reflect or simply come from different directions. So with basic RF detectors, it is not easy to know what is what and where the signal is coming from.

Contact us to do a hands-on, eyes-on, comprehensive search.

Request Your Free TSCM - Bug Sweeping Assessment

 

 

 

Corporate Espionage

Industrial espionage, economic espionage, corporate espionage

Industrial espionage, economic espionage, corporate espionage is conducted for commercial purposes instead of national security reasons. For many companies, it is impossible to admit that they were a victim of such types of “mishaps”. This means that your investigations into these matters need to be ultra discreet. You have to be vigilant and set up a proper counter-espionage and counter-intelligence system. Corporate spies could have set up legitimate offices and can be hired by competing companies to perform intelligence operations or undercover spy operations on other entities.

corporate espionage investigations

What is Corporate Espionage?

Corporate espionage refers to professional espionage conducted for different purposes, either commercial or financial. This type of espionage is also known as industrial espionage (between organizations or companies), economic espionage (by governments, on the international stage), or corporate spying.

  • Acquisition of intellectual property
  • Theft of trade secrets
  • Bribery of persons within organizations, government & companies
  • Blackmailing
  • Technological surveillance of specific targets
  • Cyber espionage
  • Data theft or Data Exfiltration by use of Malware, Ransomware, Hacking targets.
  • Cyber Attacks

It is important to be guarded against these types of activities and be able to detect and deter such types of activities in time and effectively.

Inquiry Corporate Espionage