Corporate Countermeasures Inc.
Your Information Security Specialists

How To Hire Professional Sweeping Services
For Your Information Security
Corporate Countermeasures, Inc.
P O Box 33244, Austin Texas, 78764
Phone: 512-420-9292 Fax; 512-420-9393
Email: RThomas007@aol.com
 
Under no circumstances should you make contact from a suspect telephone on the premises you want swept. If you are the CEO of a company and do any amount of work from your home, you home could also be under attack so DO NOT make contact from home. It's best to call from a payphone.
Although there are a number of people that claim to offer de-bugging or sweeping services at bargain basement prices, the overwhelming majority of them have neither the equipment nor the knowledge to perform a comprehensive sweep of your offices. Technical Countermeasures Surveillance Services (TSCM) for your business needs to be taken vary seriously especially if your company is information driven as leakage of your business information has a direct relationship to the success or failure of your business or professional practice. In fact,contracting with the wrong information security specialist could be fatal to your company, corporation or professional practice. Our firm specializes in high security sweeping, threat analysis, computer security, information security consulting and training all rolled into one comprehensive service without all the bull you usually see in this specialized service. We don't make any bones about it. There isn't any such thing as complete and total secured communications but your firm or company can and should have a goal to reach a level of information security that counters the overwhelming majority of information theft.
 
Initial Consultation And Overall Preliminary Evaluation And Walk Through
The initial consultation should be done in a secured meeting place away from your office. Before an actual sweep is done of your premises, an overall evaluation and walk through inspection is conducted to determine countermeasures strategy. Preliminary information gathering for your sweep and high threat areas are determined in this phase. This gives us the ability to plan your TSCM sweep, adjust and calibrate the sensitive equipment and come prepared with the right formulation of methodology, techniques and equipment with focused concentration on high threat areas. At the time the overall preliminary walk through is done, various covert pocket detectors are in use. During the preliminary evaluation, various sweeps and observations are conducted of the outside of your premises for further planning and further evaluations. Usually, the Inital Consultation and Preliminary Evaluation can take place on the same day.
 
Radio Frequency Sweeping & Analysis
Radio frequency sweeping involves carefully sweeping your premises for bugs. Analysis involves using a spectrum analyzer for inspection of anything suspect. Although there are literally dozens of cheap bug detectors in the market place today, the overwhelming majority of them have neither the power nor the sweeping ability to do a sweep at the level you need. Our sweep service is done with a top of the line broad band counter surveillance receiver called the CPM-700 Countermeasures Sweep A unique sound source called The Sound Spa is placed in the office to be swept for sound verification. The sweep is done in a covert manner. Although the CPM-700 can conduct on-the-spot audio verification, high grade frequency counters are used to record the frequency of the signal for spectrum analysis. Spectrum Analysis is done with a high-end spectrum analyzer specially configured for countermeasures sweeping service called the Oscar-Omni Spectral Correlator. The Oscar-Omni Spectral Correlator is a computer controlled and programmable detection unit with a base price of $15,000 designed for automatic comprehensive sweeping and analysis. Automatic mode sweeping is done in high venerability areas such as the CEO's office and conference room offices with the Oscar-Omni Spectral Correlator which will automatically scan, correlate and print out and suspect signals while other tasks of the assignment are being performed providing a double sweep in high threat areas. Automcially correlating pickup with actual room audio, the Oscar can quickly locate a threat signal modulation. Often times, the Oscar is left in high threat areas overnight to run additional testing automatically. A computerized radio frequency database is maintained on a laptop computer for localized verification of signals obtained during the sweep for further verification.
 
By using the above methods, a complete and through sweep and analysis of the radio frequency can be made that will detect all standard forms of bugs and hidden transmitters as well as detect higher-end bugging devises such as frequency hopping bugs, snuggled bugs, microwatt bugs and burst bugs. A frequency hopping bug is one that changes frequency frequently while sending audio. A snuggled bug is one that is tuned just off a major radio station in order to avoid detection. A microwatt bug is a lower powered bug often missed by inexpensive gear. A Burst bug is one that stores audio and then sends it in small bursts. Most of the medium end and low end equipment on the market today, even most spectrum analyzers; can not perform all these functions.

With a unique combination of knowledge and equipment, the methodology employed for sweeping services is one of the most comprehensive in the security industry. All friendly radio signals are analyzed for potential hidden eavesdropping near the friendly signal so no potential bugs are missed.
 
Telephone Line And System Testing, Inspection And Analysis
Using the latest high tech equipment, your telephone, telephone lines and telephone system is checked for bugs and wiretaps very comprehensively as the telephone itself is likely the most dangerous threat to your information security. Various forms of telephone checking include individual audio line verification methods which tests each wire and wire pair on your telephone line for audio eavesdropping, tests and inspection for wiretaps and bugs that may be hidden on your telephone line and tests for modifications to your telephone equipment itself. Other various forms of testing and inspection is conducted to check for hidden tape recorders that may be present on your telephone line. Specialized testing equipment is used such as volt meters, time domain reflectometers and telephone line tracers. The type of telephone equipment and system you use in your premises is needed before the telephone system sweep can be made. A clean telephone (one that has never been used) is usually needed. All telephones are taken apart and visually inspected. When they are put back together, screw heads are marked with a UV pen for quick and easy detection of any tampering and removal at a later date.

Various forms of telephone testing gear including top of the line analyzers, time domain reflectometers, line tracers, monitors, scopes and meters cost in the neighborhood of about $10,000 or more and months of training to utilize but we feel that, since the telephone line is the most vernable piece of common equipment subject to eavesdropping attack; the right combination of testing equipment and knowledge is needed to perform a comprehensive countermeasures detection service.
 
 
Electrical Line Detection
All electrical lines are checked and inspected for what is commonly called carrier current eavesdropping which uses the existing wiring as a carrier for audio.
 
Infrared Detection
Invisible Infrared Light can be used to carry audio signals. A comprehensive sweep is conducted to detect any such source using a specialized IR probe with the CPM-700.
 
Hidden Line Testing
Any questionable line found on your premises that can not be identified is checked to make sure it's not a hidden microphone line or other line used for eavesdropping. Specialized probes in conjunction with the CPM-700 are used.
 
Premises Wall Inspection/Detection
Your office walls are swept with a unit called a Non Linear Junction Detector to detect any type of eavesdropping equipment that may be hidden and buried in your office walls. This method of detection will detect eavesdropping equipment whether active, turned off or dead. Further analysis and inspection is done with an optical borescope and portable high grade metal detectors. Moreover, all electrical outlets electrical on/off switch plates and telephone jack plats are removed for inspection using various lights and borescopes which can see around these areas and inside your walls. When your cover plats are finally put back on, invisible UV pen markings are used to mark the screw heads for quick and easy detection of any tampering or removal at a later date.

A Non Linear Junction Detector is a detection unit that runs around $21,000 that will detect non linear junctions inside of walls and furniture. Used in the correct manner, this method can detect almost any type of hidden eavesdropping device without taking apart all of your office furniture and knocking down walls which would be impractical. Additional equipment is employed in this method consisting of borescopes (an optical devise to look inside walls the furniture for suspect readings with the non linear junction detector) and metal detectors (for further verification and analysis)
 
Hidden Tape Recorder And Video Camera Sweep
Aside from the use of non-linear junction detection mentioned above, high security areas are also swept with a magnetic probe for the detection of hidden tape recorders and video cameras that may be installed.
 
Acoustic Leakage Analysis And Detection
A common form of eavesdropping in today's modern business office is Acoustic Leakage. Your private conversations can and frequently do travel through walls, air ducts and pipes which can easily be picked up at another area. A complete detection and analysis is made of your unique acoustic leakage problems with specialized acoustic leakage probes and recommendation made to combat this problem.
 
Common Office Equipment Inspection And Analysis
Various forms of office equipment such as lights, dictation machines, calculators, fax machines and other equipment are checked as these type items make ideal hiding places for bugs. Fax machines are especially venerable.
 
Computer Security
A though inspection and analysis of your office computer is conducted for various forms of eavesdropping and information leakage. Usually, special procedures, techniques and software can be used to vastly lower the threat of information leakage from your computer equipment. Installation of virus protection software, security wiping software, system loocking software and encryption software can be arranged.
Advanced Computer Security
Advanced Computer Security services on LAN systems can be arranged.
 
Recommendations And Training
Unlike many sweep services in the United States, extensive recommendations are made for your company security involving inexpensive measures that can usually be taken by your company to bring your business up to an information security level that counters most threats. The overall approach is one of a complete consultation service to not only perform a comprehensive countermeasures sweep for your information security today but to provide you with information security levels for threats after the job is done. Moreover, we provide a short training session on some basic steps and procedures you can take to better secure your business and professional information from theft.
 
Equipment And Training
Aside for the actual sweeping services and information security consulting, our firm also offers various forms of equipment sales, installation and training for your own in-house information security program. For a review of equipment click here.

Countermeasures Sweep And Survey Pricing

Initial Consultation And Preliminary Survey/ Evaluation: $500.00
The Actual Countermeasures Sweep Analysis And Evaluation depends on the time involved and is based on the following time frame:
 
1/2 Day: $1,000.00
Per Day (First Day) $1,800.00
Additional 1/2 Day: $750.00
Additional Day: $1,500.00
Written Report And Recommendations: No Charge
A Countermeasures Sweep for a small business usually takes between one and three days depending upon square footage, the telephone system other equipment used, the type of business or profession and other factors. A prearranged retainer is required before the assignment is started.

Ongoing Contracts: Ongoing contacts can be arranged by the year with a minimum of four sweeps per year at subtancially reduced rates after the first sweep.
Travel expenses outside the Central Texas area are not included.

TAKE A SLIDE SHOW OF THIS SERVICE AND EQUIPMENT USED
 
RETURN TO MAIN COUNTERMEASURES PAGE

GO TO COUNTERMEASURES TRAINING PRODUCTS

READ ARTICLES ON COUNTERMEASURES

OBTAIN EXTENDED REVIEWS OF EQUIPMENT USED