Free report explains how to detect listening devises


Are You Being Bugged

This page is intended to help the individual assess if they are at risk from bugging and to an extent take action against it. The information contained here is not a comprehensive guide to counter surveillance, as this would be well beyond the scope of most none professionals. To put it simply, if a surveillance device has been planted by the security services ie: MI5 the chances of the untrained person detecting it would be very slim. The term untrained person includes a large proportion of private investigators, who claim to be experts in this field.

Am I at Risk From Being Bugged
A quick answer to this is obviously YES. The question is who would want to or stand to gain from going to the trouble and expense of doing it.
Political public figures, people engaged in fringe extremist groups, those cheating on their partner, persons engaged in research development especially in the IT field, higher management personnel in competitive companies. The list is endless.

Do you know
-A simple modification to your telephone hhandset can leave the microphone connected all the time allowing anyone to listen in to all conversations in the room.

-A telephone transmitter which transmits all your telephone conversations by radio may be installed in the phone, the socket or junction box, anywhere on the line, as far back or even inside the exchange.

-Fax transmissions can be intercepted by quality telephone taps.

-A bug may be installed without entering your premises.

-A wall contact microphone can pick up conversations through up to 30cm of concrete.

-A socket or light switch may be replaced with an identical unit that contains a built in transmitter, powered by the mains.

-Speech in a room causes a small vibration on the window, which can be detected and converted to audio, by a laser beam, from some distance away.

-A computer screen radiates a signal (try putting a radio at the side of it), this radiation leaks out of windows and can be received by a special receiver which could then show you whatever the screen was displaying.

Some Indications That You May Be a Victim Of Bugging
-Confidential information seems to be gettting out to competitors

-Competitors seem to be just one step ahead all the time

-Your home or premises have been broken into and very little or nothing was taken

-Sockets or switches show signs of being moved slightly, ie: the wallpaper may be disturbed.

-Various vehicals parked near to your premises, that appear to be empty

-Your telephone rings but no one speaks or you just hear a short tone

-You hear unusual sounds (crakling, clicks, volume changes) on your telephone handset

-Indications that your handset may have been exchanged, ie: numbers in memory may be lost

-Repairers or utility companies turn up to carry out work when they have not been called

-Furniture or items appear to have been disturbed

-Interference on your radio or television

- A odd texture on small parts of wall, floor or skirting boards, this may indicate the use of conductive paint from a hidden microphone.

-Unexplained brick or plaster dust on floor, or a small discoloration showing on the wall, this may indicate drilling from the other side of the wall or plaster, paper being lifted to plant a microphone.

If you suspect you are a victim of bugging, the first thing to decide is, do you want to alert the enemy that you suspect this, as sometimes, once you are aware of it you can use the fact to your advantage by a campaign of misinformation. Other things to take into consideration, are that once the electronic spy is alerted they may take steps to make detection more difficult. ie: temporary removal etc.

The most impotant part of any check is the visual inspection this when carried out correctly can take many hours, as each room has to be checked inch by inch. Also all socket outlet, light switches, vent grills are to be removed. It is often wise to purchase a set of these items giving you something as a comparison with the ones which you remove.

Other items which you may find more difficult to check and are very popular systems for the electronic spy these are fire and intruder alarm units and they may use the existing alarm wiring to pass the signal back to the control unit which may conceal a transmitter or recorder in its circuitry. When inspecting the outside of the premises be on the lookout for any newly replaced mortar or any signs of drilling etc. the same goes for inside, and a careful examination of plaster work and skirting boards is required, as often a slight discoloration is caused when a microphone is placed just below the surface or a fine layer of conductive paint may have been used to cary power/signals to a hidden device.

The first and foremost thing to check is the telephone system. Probably the easiest and safest way to deal with the handset is to replace it with a new one unless you have the know-how to test it yourself. The socket junction boxes are best checked by acquiring identical units and comparing the circuits visually. Companies such as BT will carry out a line check for free if you report it as a faulty line (remember to make any calls that may alert the person eavesdropping from another phone, away from the premises), this line test shows up many of the line abnormalities caused by parasitic line activated telephone transmitters/recorders. A line voltage check with the handset off the hook will often show up series connected devices. Apart from a visual inspection of the line as far back as possible and a check for RF transmissions (see below) with the handset on off the hook, there is little more the individual can do without seeking proffesional assistance.

There are devices that can be purchased that detect or destroy telephone bugs. In general it is always wise to regard the telephone as an unsecure means of conversation.

Equipment
There are many devices available, costing thousands, but without expert knowledge the results can often be worthless and a good near range RF detector with a range up to at least 2 GHZ should suffice for the DIY bughunter. The ideal type are the ones that display signal strength and the frequency. Another valuable piece of equipment can be a scanner as when a RF signal is detected the scanner can be locked onto it and you can verify what the transmission is and if you are in the same area as a room bug you will get a loud feedback. Start the sweep on a room by room basis checking with electrical items switched on and then off. Quite often you will come across RF transmissions that are perfectly innocent such as wireless alarm systems and commonsense and painstaking elimination have to be used.

The presence of a transmitter is usually shown by a steady frequency with the signal strength rising as you get closer to the source, what can cause difficulty and confusion is the fact that many RF transmitters emit signals on several frequencies at close range, so be warned and dont be convinced you have several bugs in one room. When sweeping pay particular attention to vent grills, electrical outlets, switches, light fittings etc. and make sure lights, ceiling cavities, wall surfaces and the external areas of the property are checked. Remember that small battery powered transmitters can be concealed in almost anything.

Back To Crime Page           Back To Secret Stuff Page


Free Credit Reports
Free DMV Links
Free Real Estate Forms
Free Secret Info Page
Free Crime Protection
Free Legal Forms
Free Classified Links
Free Auction Site Links
Free Business Forms
Free Government Programs
Free Web Business Ideas
Free Real Estate Reports
Free HTML Tutorial
Free Software Sources
Free Business Reports
Free Real Estate Glossary
Free Web Art
Car Tips