Detect Spyware

Detect Spyware

Protect against interception is a term used for technical precautions and control (so-called “scanning”) of objects and spaces to avoid monitoring the conversations and circulation of audio data.

First of all, a distinction is made between passive and active protection against interception.

Passive protection against interception

Passive space protection deals with precautionary measures such as. :

Design and construction of safe spaces for councils, communication lines and vehicles, aircraft, and floating means.

Prevention, suppression and distortion of electromagnetic waves (compromise radiation eg from a screen or a computer) with e.g. noise generators

the creation and configuration of secure communication with the help of encryption, the use of encrypted UDP / TCP / IP (VPN) connections with which the information is transferred, including voice over VoIP telephony.

Protected installations sometimes place a special wallpaper with textail metal grid used, which works as Faraday cages and thus achieve a certain electromagnetic shield. This measure makes it extremely difficult to operate radio frequency monitors. It must be taken under consideration that wireless communication within the office (eg via mobile phone, WLAN, Bluetooth, etc.) is no longer functional.

Active protection from space interceptions

Active spy protection (“scan”)

Also known as locating interception domains. The targeted “sweep” of the spy devices with the technical equipment.

Broadband Receiver / Frequency Meter

Non-linear link detectors (for detecting semiconductors, ie electronic components)
Spectrum Analyzer
Portable radiography devices (eg for illuminating non-disassembled objects such as walls, telephone sets, gifts, etc.)
Thermal imaging (thermal imaging camera) for detecting hidden electricity consumers from heat radiation
Protocol Analyzer
Line measurement devices
Other optical and technical inspection devices

Examining technical devices (eg. Such as telephone, photocopiers, computers, etc), furniture (eg office desks, chairs, decorative objects such as sculptures, etc.) and the space itself etc. (walls, doublefloors, false ceilings)

Despite today’s technology, scanning handiwork specifically wired or recorded listening devices can only be found by appropriate visual inspection. The following activities belong to the basic scanning list:

Generation of spectral analysis, comparison with spectral analysis, control of possible deviations (new signals)

Detailed, technical and visual inspection of the building’s infrastructure such as walls, floors, power supply, cable channels, pipe wells and other objects (computers, printers, furniture, etc.)

A scan represents only one snapshot and therefore only an assessment of the status at the time it is executed. It may be helpful to repeat the process on a regular (or even irregular) schedule or as required (eg before and during major meetings).

Our office has an internal detection department with long term experience in Greece and also abroad, and also is the official partner of the biggest and safest parties around the world, conducting interception investigations along with placing interception countermeasures.

 

 

Private investigations?

Private Investigation Offices in accordance with Law 3206/2003 Government Gazette 298 / Α / 23-12-2003 are prohibited from using the titles: detective, private detective, Detective Athens etc.

Contact

Contact us about private investigations on Greece.