• Top banner


Be confident of confidentiality

Covert listening devices which are more commonly known as bug's are normally a combination of a miniature radio transmitter with a microphone . The use of bugs, called bugging, is a common technique in surveillance and in particular industrial espionage. Most bugs transmit information, whether data, video, or voice, using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver, although a good working knowledge of RF theory is needed to operate the equipment effectively.

Sweeping is effective but not fool proof. Advanced bugs can be remotely operated to switch on and off, and some even rapidly switch frequencies in order to make the location of sweepers more difficult. Remotely activated mobile phone microphones known as ghost phones are available in any particular make or model and function quite normally. These phones however have been adapted to remotely activate the microphone, even when a call is not being made for the purpose of listening to conversations in the vicinity of the phone. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Burst transmitter bugs store recorded conversations in a buffer, then transmit the entire buffer in a short burst. This style of bug is almost impossible to pick up unless sophisticated scanning devices are running non-stop.

If you are suspicious that your premises or communications systems have been bugged, do not discuss your fears around the suspected area and try to isolate the area without making your fears known to anyone else other than the relevant people who need to know. Once you have done this use a private computer or telephone and contact us.We can provide fully trained expert personnel with the most advanced electronic sweeps, detectors and neutralisers to secure both your premises and your conversations.