[wpml_language_switcher flags=1 native=1 translated=2][/wpml_language_switcher]
 

Counter Surveillance/Bug Sweeping

Revealing What Others May Not See.

Ranging from unwanted people prying on you, your loved ones, your place of business or home, Lead Investigations Cambodia’s private detectives are experienced in conducting thorough, ethical and legal action.

 

Suspect that your place of work has covert cameras or listening devices installed? Has your business moved into a new building and you would like to find out if any security breaches are not visible at first glance? Allow us to conduct a rigorous search and give you peace of mind. We are proud to be the only company that offers this service in Cambodia. As a registered private investigation company in Cambodia, our reliability and experience speaks for itself.

 

What are Listening Devices? How do they work?

 

Listening devices are electronic devices that are designed to pick up audio within a limited range. The range, of course, depends on the quality and the price of the listening devices.
Naturally, fancier listening devices can be hard to detect and they can pick up quietly emitted sounds, and sometimes sounds that are further away.
This is why the process of debugging an area can take the investigating team longer than expected.
There are generally two ways in which the listening devices then transmit these audio clips to the eavesdropper. First one being that the recordings may be stored on an external or internal storage. Second one being that they transmit the signals/recordings to an external receiver. This can be done either through Wi-Fi signals, Bluetooth or even through GSM methods. GSM in this context generally means that the device contains a sim card and the eavesdropper may simply phone the device, which “answers” the call and allows them to listen in.
Easier (Generally speaking) to detect devices may include ones that are transmitted through wire, or the above-mentioned wireless versions- countersurveillance devices should pick these up. The challenge comes, though, when the listening device has depleted its power source.

 

How are these devices found?

The methods used are to detect the signals that the devices emit. This method only works when the devices are powered on when you look for them.
Some devices are easier to detect than others: Many modern listening devices are sound activated; therefore, one would have to initially make a slight noise in order for them to be activated. Devices that constantly record or emit a signal, as mentioned above, will be detected using bug-sweeping equipment.
The main difference between how one would look for a listening device vs. a video recording device is that the actual camera “hole” (Iris) is visible when looking through a specialized infrared emitting “lens”. Most video recorders are, however, also fitted with a microphone and carrying the same radio/Wifi/GSM or Bluetooth emission methods as mentioned above.
From experience, locations in which eavesdropping equipment is placed can be very unexpected, in other words, the perpetrator may have had enough time to plant the device in a very creative and discreet location. This is the reason that there are multiple factors that contribute to a successful bug sweep (Identifying all threats):

1) Reliable, professional equipment.
2) Experience- having first-hand knowledge derived from finding unwanted devices from former cases.
3) The ability to think in a creative manner that relies on the Agent’s innovation and ingenuity. This is important as devices can be very small and their battery life can last for up to a year if they are able to only detect sound/video footage when their motion/sound detectors are enabled.

Finally- it is noteworthy to keep in mind that there are FM/AM devices, these, however, are rather old fashioned and they are mostly used for real time surveillance- this is when the receiver would be within a few hundred meters and monitoring sound waves in their target location. These work with sound vibrations (Best when attached to glass windows) and whilst the quality of their recordings is better when compared to other devices, their battery life is short and is not intended to work over long-term surveillance. Yes, there are exceptions- but if there are any of these devices still in the vicinity, they will be found.

 

For a deeper look at countersurveillance/antisurveillance and for some tips, read here.

Contact us to discuss any possible way forward.