LEARN WHY!
THE ESPIONAGE RISK
Most basic sweeps provided by competitors will only scan for transmissions from covert devices and electronic signatures. What happens when the bug is not a transmitter and its electronic signature is masked by hiding it within other electronics? Companies only scanning in this way will not be able to detect a recording device installed within other electronics.
Electronic bugs, listening devices, hidden cameras, Bluetooth interception, Laser microphones, burst transmitters, and other similar eavesdropping devices are all easily available over the internet to anyone with a credit card.
Oftentimes NSI Global Counter Intelligence will be engaged to perform a full Technical Surveillance Counter Measures (TSCM) sweep after another company has seemingly rushed through a sweep and only provided a basic all-clear report. Typically these reports contain very little detail of what specialist investigative techniques and methodologies were carried out. As a result, the client is left unconvinced that they received a thorough investigation and many espionage devices remain undetected. The breaches continue unabated and the company remains at risk!
THE NSI COUNTER INTELLIGENCE SOLUTION
This is where NSI’s superior methodology and employment of highly sensitive equipment as used by federal governments and intelligence agencies comes into play. At NSI our government security cleared Technical Surveillance Counter Measures Investigators have been trained and equipped to provide Government Level sweeps.
One example of our superior methodology is the inclusion of Thermal Imaging of all electronic equipment and room surrounds. This reveals any unusual heat signatures to our experienced investigators. This is followed by a thorough teardown inspection of all flagged items. Below we have images of a common router being used in a CEO’s office. This unit initially passed all standard sweep tests. However, upon further thermal analysis was found to have a hidden high definition video camera that was able to record everything being discussed and had a full view of the CEO’s keyboard and computer screen. The router was prepared in such a way that it could easily be swapped after hours with a standard router if the attacker was concerned about an upcoming bug sweep. Additionally, it could be swapped for a second unit containing another camera whilst the footage of the first was being reviewed.
The images contained herein are an example of one such case.
On initial inspection, and when subject to TSCM Sweep, network and physical analysis, this router came up clean. It was functioning perfectly and showed no signs of tampering.
When subjected to thermal analysis by an experienced investigator we detected an unusual heat signature compared to what is typical for a relatively uncomplicated device. Simply put, a standard router would not require any additional internal wiring and certainly should not output heat in several different areas as per this image. The faint outline of wiring and multiple heat sources would be nearly impossible to detect with commercially available thermal cameras.
Upon subsequent physical inspection, a hidden self-contained high-definition pinhole video recorder with a 128 GB micro SD card was discovered.
An example of the expected heat signature emanating from the microprocessor chip of an unmodified router.