Information Security Immunotherapy
"Harden the target instead of plugging the leaks."
"Statistically, 75 percent of proprietary information
is lost from physical actions, rather than hacking."
GLOBAL E2C PTE LTD - Corporate Security Economic Espionage Course
FIND THE BUGS
Touch to check.
HOT WIRED MIC
One of these microphones is doubling as a bug.
VIDEO TELECONFERENCING BUG
Turning the screen off does not turn the system off. If the auto-answer feature is on, anyone can call in and eavesdrop.
THE QUICK TOSS BUGS
Mini radio-transmitters and micro voice recorders are easily tossed into lighting coves and behind credenzas.
Sound Absorbent Wall Panels
These panels are often just press-fit into place. Popping them out is easy. It is a great place to plant a listening device. After all, they are made to absorb sound.
Under Table Wiring
Boardroom tables are loaded with under the table electronics and wiring. Conversation conduits to your enemies abound.
FM Wireless Microphones
Many board rooms bug themselves by using outdated FM wireless microphones. Transmissions can be easily intercepted up to 1/4 mile away. We have recommendations which will end this vulnerability.
No information security vulnerabilities.
This office was inspected by Murray Associates.
Tiny GSM Bugs
Basically stripped down cell phones, GSM bugs are tiny and cost under $50. They are being built into everything – from calculators to the power strips under the desk. It seems too obvious, but we have found bugs behind pictures and in the plants.
The best bug in the house. Powered 24/7, it has two microphones, sits close to its target. It can spy on phone calls, and room conversations when properly modified.
The Bugged Gift
From the Trojan War to the Cold War to today's Economic War. They fall for it every time.
Hidden in Molding
Easy to find because it uses copper wire. Fiber-optic microphones, however, look like very fine fishing line. Many search teams would miss them.
can be secreted in book bindings and other office objects. They don't transmit far, but to another office, the parking lot, or across the street is often far enough.
We look for outside surveillance threats too: photography of papers on desks; lip reading; contact microphones attached to outside walls; covert entry via unsecured windows; and even unlikely laser attacks.
Bug in Table
Support beams in furniture can hold enough batteries to power eavesdropping transmitters for years.
They blend in perfectly. You can't tell by looking. This one has been detached and turned over so you can see it.