Wireless communication is very vulnerable to capture and eavesdropping. With encryption technology the threat has diminished however, most wireless devices transmit the signal 360 degrees in a distance from several feet to several miles. The signal can be captured by an individual or a device in an adjoining office, a vehicle outside, a close by hotel room or a next door neighbor.

An analog signal can be easily overheard by simply tuning into the signal with a scanner device. Many of the wireless microphones that we have seen and tested in conference rooms are analog. Many of the older wireless phones use analog technology and are not safe at a confidential meeting or a sensitive conversation. If the device has digital technology or even an encrypted signal it can be captured, recorded (downloaded), and then scrutinized making the conversation legible and conventionally understood.

Wireless devices are commonplace in our society, and as technology advances; cordless phones, wireless headsets, wireless microphones, wireless computer keyboards and other accessories, cell phones, PDA’s, video devices and more, are becoming commonplace in our offices and homes. As you probably know, many of these communication devices can be prone to a clandestine or surreptitious type of eavesdropping activity.

There are no expectations that the use of these types of devices will diminish in time. Consider someone eavesdropping on your private or confidential conversations. What would be the cost or threat to your business or life style if the content of a proprietary conversation were in the hands of a competitor, disgruntled employee or adversary? What would the cost, embarrassment, down time be for this type of vulnerability and breach?

Merit Security has a distinguished history of providing Technical Surveillance Counter Measures (TSCM) de-bugging sweeps and services. We have provided these services for:

  • Major Corporations from competitors, unwanted media, foreign intelligence services and other adversaries
  • Companies to fulfill requirements for proper Due Diligence
  • Specific sweeps and audits at residences, hotels and off site locations
  • Trade shows and stockholder type meetings
  • Specific coverage, sweeps and audits at meeting sites, with real time threat monitoring during meetings
  • Individuals to help maintain their privacy and confidentiality

Our sweeps and audits come with an analysis and report of our TSCM operations, listing anomalies and vulnerabilities with prioritized recommendations to mitigate or eliminate threats. Kindly visit TSCM for additional information.

We urge you to review our Proprietary Information page on this web site and welcome your call if there is a concern.
It is highly recommended you discuss this and make a call to us in a Non Target Area on a secure phone.

Leave a Comment