
Corporate Countermeasures Inc.
Your Information Security Specialists
How To Hire Professional Sweeping Services
For Your Information Security
- Corporate Countermeasures, Inc.
P O Box 33244, Austin Texas, 78764
Phone: 512-719-3595 Fax; 512-719-3594
Email: RThomas007@aol.com
-
- Under no circumstances should you make contact from a suspect
telephone on the premises you want swept. If you are the CEO
of a company and do any amount of work from your home, you home
could also be under attack so DO NOT make contact from home.
It's best to call from a pay phone.
- Although there are a number of people that claim to offer
de-bugging or sweeping services at bargain basement prices, the
overwhelming majority of them have neither the equipment nor
the knowledge to perform a comprehensive sweep of your offices.
Technical Countermeasures Surveillance Services (TSCM) for your
business needs to be taken vary seriously especially if your
company is information driven as leakage of your business information
has a direct relationship to the success or failure of your business
or professional practice. In fact,contracting with the wrong
information security specialist could be fatal to your company,
corporation or professional practice. Our firm specializes in
high security sweeping, threat analysis, computer security, information
security consulting and training all rolled into one comprehensive
service without all the bull you usually see in this specialized
service. We don't make any bones about it. There isn't any such
thing as complete and total secured communications but your firm
or company can and should have a goal to reach a level of information
security that counters the overwhelming majority of information
theft.
-
- Initial Consultation And Overall Preliminary Evaluation
And Walk Through
- The initial consultation should be done in a secured meeting
place away from your office. Before an actual sweep is done of
your premises, an overall evaluation and walk through inspection
is conducted to determine countermeasures strategy. Preliminary
information gathering for your sweep and high threat areas are
determined in this phase. This gives us the ability to plan your
TSCM sweep, adjust and calibrate the sensitive equipment and
come prepared with the right formulation of methodology, techniques
and equipment with focused concentration on high threat areas.
At the time the overall preliminary walk through is done, various
covert
pocket detectors are in use. During the preliminary evaluation,
various sweeps and observations are conducted of the outside
of your premises for further planning and further evaluations.
Usually, the Initial Consultation and Preliminary Evaluation
can take place on the same day.
-
- Radio Frequency Sweeping & Analysis
- Radio frequency sweeping involves carefully sweeping your
premises for bugs. Analysis involves using a spectrum analyzer
for inspection of anything suspect. Although there are literally
dozens of cheap bug detectors in the market place today, the
overwhelming majority of them have neither the power nor the
sweeping ability to do a sweep at the level you need. Our sweep
service is done with a top of the line broad band counter surveillance
receiver called the CPM-700 Countermeasures Receiver and The
Oscor Omni Spectral Correlator A unique sound source called
is placed in the office to be swept for sound verification correlation.
The sweep is done in a covert manner. Although the CPM-700 can
conduct on-the-spot audio verification, high grade frequency counters are used to
record the frequency of the signal for spectrum analysis. Spectrum
Analysis is done with a high-end spectrum analyzer specially
configured for countermeasures sweeping service called the Oscor-Omni
Spectral Correlator. The Oscor-Omni Spectral Correlator is a computer
controlled and programmable detection unit with a base price
of $15,000 designed for automatic comprehensive sweeping and
analysis. Automatic mode sweeping is done in high venerability
areas such as the CEO's office and conference room offices with
the Oscor-Omni
Spectral Correlator which will automatically scan, correlate
and print out and suspect signals while other tasks of the assignment
are being performed providing a double sweep in high threat areas.
Automatically correlating pickup with actual room audio, the
Oscor
can quickly locate a threat signal modulation. Often times, the
Oscor
is left in high threat areas overnight to run additional
testing automatically. A computerized radio frequency database
is maintained on a laptop computer for localized verification
of signals obtained during the sweep for further verification.
-
- By using the above methods, a complete and through sweep
and analysis of the radio frequency can be made that will detect
all standard forms of bugs and hidden transmitters as well as
detect higher-end bugging devises such as frequency hopping bugs,
snuggled bugs, microwatt bugs and burst bugs. A frequency hopping
bug is one that changes frequency frequently while sending audio.
A snuggled bug is one that is tuned just off a major radio station
in order to avoid detection. A microwatt bug is a lower powered
bug often missed by inexpensive gear. A Burst bug is one that
stores audio and then sends it in small bursts. Most of the medium
end and low end equipment on the market today, even most spectrum
analyzers; can not perform all these functions.
With a unique combination of knowledge and equipment, the methodology
employed for sweeping services is one of the most comprehensive
in the security industry. All friendly radio signals are analyzed
for potential hidden eavesdropping near the friendly signal so
no potential bugs are missed.
-
- Telephone Line And System Testing, Inspection And Analysis
- Using the latest high tech equipment, your telephone, telephone
lines and telephone system is checked for bugs and wiretaps very
comprehensively as the telephone itself is likely the most dangerous
threat to your information security. Various forms of telephone
checking include individual audio line verification methods which
tests each wire and wire pair on your telephone line for audio
eavesdropping, tests and inspection for wiretaps and bugs that
may be hidden on your telephone line and tests for modifications
to your telephone equipment itself. Other various forms of testing
and inspection is conducted to check for hidden tape recorders
that may be present on your telephone line. Specialized testing
equipment is used such as volt meters, time domain reflectometers and telephone
line tracers. The type of telephone equipment and system
you use in your premises is needed before the telephone system
sweep can be made. A clean telephone (one that has never been
used) is usually needed. All telephones are taken apart and visually
inspected. When they are put back together, screw heads are marked
with a UV pen for quick and easy detection
of any tampering and removal at a later date.
Various forms of telephone testing gear including top
of the line analyzers, time domain reflectometers, line
tracers, monitors, scopes and meters
cost in the neighborhood of about $10,000 or more and months
of training to utilize but we feel that, since the telephone
line is the most vulnerable piece of common equipment subject
to eavesdropping attack; the right combination of testing equipment
and knowledge is needed to perform a comprehensive countermeasures
detection service.
-
-
- Electrical Line Detection
- All electrical lines are checked and inspected for what is
commonly called carrier current eavesdropping which uses the
existing wiring as a carrier for audio.
-
- Infrared Detection
- Invisible Infrared Light can be used to carry audio signals.
A comprehensive sweep is conducted to detect any such source
using a specialized IR probe with the CPM-700.
-
- Hidden Line Testing
- Any questionable line found on your premises that can not
be identified is checked to make sure it's not a hidden microphone
line or other line used for eavesdropping. Specialized probes in conjunction with the
CPM-700 are used.
-
- Premises Wall Inspection/Detection
- Your office walls are swept with a unit called a Non Linear Junction Detector to detect any
type of eavesdropping equipment that may be hidden and buried
in your office walls. This method of detection will detect eavesdropping
equipment whether active, turned off or dead. Further analysis
and inspection is done with an optical
borescope and portable high grade
metal detectors. Moreover, all electrical outlets electrical
on/off switch plates and telephone jack plats are removed for
inspection using various
lights and borescopes which can see around these areas and
inside your walls. When your cover plats are finally put back
on, invisible UV pen markings are used to mark
the screw heads for quick and easy detection of any tampering
or removal at a later date.
A Non
Linear Junction Detector is a detection unit that runs around
$21,000 that will detect non linear junctions inside of walls
and furniture. Used in the correct manner, this method can detect
almost any type of hidden eavesdropping device without taking
apart all of your office furniture and knocking down walls which
would be impractical. Additional equipment is employed in this
method consisting of borescopes
(an optical devise to look inside walls the furniture for suspect
readings with the non linear junction detector) and metal detectors (for further verification
and analysis)
GO TO PAGE TWO OF THIS OVERVIEW
-
TAKE
A DEMONSTRATION RIDE ON A
COUNTERMEASURES JOB RIGHT NOW
-
- COMPUTERIZED
COUNTERMEASURES SWEEPS
CLICK HERE FOR PRICING
- RETURN TO THE CORPORATE COUNTERMEASURES
FRONT PAGE
-
- Copyright: 1999, Ralph D. Thomas
All Rights Reserved