Counter Surveillance (Are You Being Bugged). This page is intended to help the individual assess if they are at risk from bugging and to an extent take action against it.
The information contained here is not a comprehensive guide to counter surveillance, as this would be well beyond the scope of most none professionals. To put it simply, if a surveillance device has been planted by the security services i.e: MI5 the chances of the untrained person detecting it would be very slim. The term untrained person includes a large proportion of private investigators, who claim to be experts in this field.
To enquire about having your premises checked for electronic eavesdropping devices please contact us on +44 1332 280887 or email via the contact link
Am I at Risk From Being Bugged
A quick answer to this is YES. The question is who would want to or stand to gain from going to the trouble and expense of doing it. Political & public figures, people engaged in fringe & extremist groups, those cheating on their partner, persons engaged in research & development especially in the IT field, higher management personnel in competitive companies. The list is endless.
Do you know
-A simple modification to your telephone handset can leave the microphone connected all the time allowing anyone to listen in to all conversations in the room.
-A telephone transmitter or recorder which transmits or records all of your telephone conversations may be installed in the phone, the socket or junction box, anywhere on the line, as far back or even inside the exchange.
-A bug may be installed without entering your premises.
-A wall contact microphone can pick up conversations through up to 30 cm of concrete.
-A socket or light switch may be replaced with an identical unit that contains a built in transmitter or SD card recorder, powered by the mains.
-Speech in a room causes a small vibration on the window, which can be detected and converted to audio, by a laser beam, from some distance away.
-A computer screen radiates a signal (try putting a radio at the side of it), this radiation leaks out of windows and can be received by a special receiver which could then show you whatever the screen was displaying.
Software is available for phones using the Android operating system that record all room and telephone conversations, the recordings are then send by the phones internet connection to a server where the person who has installed it can listen to the recordings on their PC. Copies of text messages mails and many other communications are also sent to the server.
Some Indications That You May Be a Victim Of Bugging
-Confidential information seems to be getting out to competitors
-Competitors seem to be just one step ahead all the time
-Your home or premises have been broken into and very little or nothing was taken
-Sockets or switches show signs of being moved slightly, i.e.: the wallpaper may be disturbed.
-Various vehicles parked near to your premises, that appear to be empty
-You hear unusual sounds (crackling, clicks, volume changes) on your telephone handset
-Indications that your handset may have been exchanged, i.e.: numbers in memory may be lost
-Repairers or unknown companies turn up to carry out work when they have not been called
-Furniture or items appear to have been disturbed
-Interference on your radio or television
- A odd texture on small parts of wall, floor or skirting boards, this may indicate the use of conductive paint from a hidden microphone.
-Unexplained brick or plaster dust on floor, or a small discoloration showing on the wall, this may indicate drilling from the other side of the wall or plaster, paper being lifted to plant a microphone.
If you suspect you are a victim of bugging, the first thing to decide is, do you want to alert the opposition that you suspect this, as sometimes, once you are aware of it you can use the fact to your advantage by a campaign of misinformation. Other things to take into consideration are that once the electronic spy is alerted they may take steps to make detection more difficult. i.e.: temporary removal etc.
The most important part of any check is the visual inspection this when carried out correctly can take many hours, as each room has to be checked inch by inch. Also all socket outlet, light switches, vent grills are to be removed. It is often wise to purchase a set of these items giving you something as a comparison with the ones which you remove.
Other items which you may find more difficult to check and are very popular systems for the electronic spy these are fire and intruder alarm units and they may use the existing alarm wiring to pass the signal back to the control unit which may conceal a transmitter or recorder in its circuitry. When inspecting the outside of the premises be on the lookout for any newly replaced mortar or any signs of drilling etc. the same goes for inside, and a careful examination of plaster work and skirting boards is required, as often a slight discoloration is caused when a microphone is placed just below the surface or a fine layer of conductive paint may have been used to carry power/signals to a hidden device.
The first and foremost thing to check is the telephone system. Probably the easiest and safest way to deal with the handset is to replace it with a new one unless you have the know-how to test it yourself. The socket & junction boxes are best checked by acquiring identical units and comparing the circuits visually. Companies such as BT will carry out a line check for free if you report it as a faulty line (remember to make any calls that may alert the person eavesdropping from another phone, away from the premises), this line test shows up many of the line abnormalities caused by parasitic & line activated telephone transmitters/recorders. A line voltage check with the handset off the hook will often show up series connected devices. Apart from a visual inspection of the line as far back as possible and a check for RF transmissions (see below) with the handset on & off the hook, there is little more the individual can do without seeking professional assistance.
There are many devices available, costing thousands of pounds but without expert knowledge, the results can often be worthless and a good near range RF detector with a range up to at least 5 GHZ should suffice for the DIY bug hunter. The ideal type are the ones that display signal strength and the frequency. Another valuable piece of equipment can be a scanner as when a RF signal is detected the scanner can be locked onto it and you can verify what the transmission is and if you are in the same area as a room bug you will get a loud feedback. Start the sweep on a room by room basis checking with electrical items switched on and then off. Quite often you will come across RF transmissions that are perfectly innocent such as wireless alarm systems and common-sense and painstaking elimination have to be used. For a range of counter surveillance device see http://www.eyetek.co.uk/bug-hunters
The presence of a transmitter is usually shown by a steady frequency with the signal strength rising as you get closer to the source, what can cause difficulty and confusion is the fact that many RF transmitters emit signals on several frequencies at close range, so be warned and don't be convinced you have several bugs in one room. When sweeping pay particular attention to vent grills, electrical outlets, switches, light fittings etc. and make sure lights, ceiling cavities, wall surfaces and the external areas of the property are checked. Remember that small battery powered transmitters can be concealed in almost anything A range of suitable equipment can be found on our web page.
The most common form of transmitter now in use utilises the GSM mobile phone network enabling the listener to simply call into the surveillance device from anywhere in the world.
To enquire about having your premises checked for electronic eavesdropping devices please contact us on +44 1332 280887 or e mail via the contact link.