Showing posts with label Audio Recording. Show all posts
Showing posts with label Audio Recording. Show all posts

Friday, April 8, 2016

Electronic Bug Sweeps | Brian Blackwell Investigations

Technical Surveillance Countermeasures (TSCM) a.k.a. electronic bug detection sweeps is the best way to anticipate active or passive eavesdropping attempts by 3rd parties, (i.e., GPS trackers, hidden cameras, hidden recorders, etc.)
Companies and corporations around the world are constantly in need of TSCM protection and bug sweeping services. The FBI reports that nearly 2 billion dollars annually is lost as a result from espionage.
Our equipment is state of the art and we can detect ranges on the electromagnetic spectrum from 1 megahertz to 10.5 gigahertz (military grade detection.)
Brian Blackwell Investigations
https://www.brianblackwell.biz

Monday, October 26, 2015

TSCM Electronic Bug Detection | Brian Blackwell Investigations

Despite the laws designed to protect us from these types of invasions of privacy, electronic bugs and wiretaps are regularly used to spy on people involved in litigation, divorce, sensitive business, and well-to-do individuals. Imagine if all of your conversations with friends, family, business associates, your lawyer, doctor or accountant were being monitored by someone.

In the age of technology we live in, it has become increasingly easy and economical for even the most conservative budgets to be able to afford to purchase and install electronic surveillance devices. These devices can be video or audio in nature and can be and usually are extremely covert in nature. Due to their relative size and intent of being undetected, they are extremely hard for the lay person to recognize, locate and remove.

Even if you are not involved in business, litigation, or divorce, ordinary people have been victimized by criminals and others who "bugged" their home, automobile and workplace, and gained access to telephone data lines using electronic bugs. The police receive too many calls from "unbalanced" people who claim that someone or the government is bugging their home to pay attention to legitimate concerns like yours, and most law enforcement agencies are not properly equipped and trained to conduct an effective sweep. Your phone service provider is also not able to help you. We suggest that you do not call your phone service provider for assistance. This set of circumstances leaves you on your own. That’s were we come in.

To ensure you haven't fallen prey to technical surveillance, Brian Blackwell Investigations conducts professional electronic counter measures to detect covert surveillance eavesdropping devices ("bugs") and hidden cameras that may have been placed in your home, your automobile, or your offices. The removal of which is known as Technical Surveillance Countermeasures (TSCM).

Technical Surveillance Countermeasures are steps taken to detect and prevent unwanted surveillance. Technical surveillance often takes the form of eavesdropping by bugging a vehicle, home, tapping a phone line, or installing hidden cameras, with the intention of committing corporate espionage, privacy invasion, extortion, identity theft, information theft, or stalking. Being the victim of technical surveillance can endanger your personal safety, and leave you vulnerable to potential financial damages.

Did You Know?

  • A simple modification to your telephone handset can leave the microphone connected all the time allowing anyone to listen in to all conversations in the room
  • A telephone transmitter or recorder which transmits or records all of your telephone conversations may be installed in the phone, the socket or junction box, anywhere on the line, as far back or even inside the exchange
  • A bug may be installed without entering your premises
  • A socket or light switch may be replaced with an identical unit that contains a built in transmitter or SD card recorder, powered by the mains
  • Software is available for phones using the Android and iPhone operating systems that can record all room and telephone conversations, the recordings are then sent by the phones internet connection to a server where the person who has installed it can listen to the recordings on their PC. Copies of text messages, emails and conversations people are having nearby can also sent to the server.

Some Indications That You May Be A Victim Of Bugging

  • Confidential information seems to be getting out to competitor
  • Competitors seem to be just one step ahead all the time
  • Your home or premises have been broken into and very little or nothing was taken
  • Sockets or switches show signs of being moved slightly, i.e.: the wallpaper may be disturbed
  • Various vehicles parked near to your premises, that appear to be empty
  • You hear unusual sounds (crackling, clicks, volume changes) while talking on your phone
  • Repairers or unknown companies turn up to carry out work when they have not been called
  • Furniture or items appear to have been disturbed
  • Interference on your radio or television

Electronic Bug Location and "Debugging"

We use modern, advanced debugging equipment combined with investigative know-how to find electronic eavesdropping bugs that may have been placed by an unsavory competitor, an insecure spouse, greedy family member, criminals.

We will do the job discreetly. No one else needs to know your concerns. All of our cases are handled in a completely confidential manner.




Wednesday, June 11, 2014

Private Investigator Basics: Surveillance

Surveillance is the art of watching someone, someplace, or some object in order to document and identify any contact, activities and whereabouts. Surveillance is conducted to prevent a crime, to obtain evidence of a crime, to obtain evidence of wrongful action in a civil suit, to document an individual’s location, to document activities in or around a specific location or building, to obtain information to be used in an interrogation, to gather intelligence as a basis for future action and to obtain information to be used in court.

Types Of Investigations Requiring Surveillance

Missing person, worker’s compensation claim, cheating spouse, vandalism, recurrent theft. 

Types Of Surveillance

The types of surveillance that fit with individual cases vary. Private investigators have to decide which types of surveillance are best suited by understanding the case and the desired outcome of the surveillance. The nature of the case will dictate whether the surveillance will be mechanical or human, whether it will be covert or overt and whether the surveillance will be stationary or mobile.

Mechanical Surveillance verses Human Surveillance

Mechanical surveillance is when technological devices are used to conduct surveillance. This is beneficial because equipment doesn’t get tired, hungry, or bored. Equipment can be used at multiple locations at the same time and information from equipment at different locations can be accessed simultaneously. For example, mechanical surveillance would be used over human in a case where someone is stealing from a construction site. Private investigators can put up cameras and go back and harvest the recordings.

Human surveillance is when the investigative team is the main source of information. Human surveillance includes tailing targets and observing targets in person. If a private investigator is looking for a missing child, they have to start by investigating the usual haunts of the child and personally visiting those locations.

Overt Surveillance verses Covert Surveillance

Overt surveillance is visible security like security agents at the mall and security cameras in casinos. With overt surveillance, people know the surveillance equipment is there to make sure no one is stealing or cheating.

Covert surveillance is undetected surveillance. Undercover detectives usually conduct this type of surveillance. It may involve trailing a target or using a piece of equipment, like a GPS tracking device, on a company truck or automobile without the company or driver’s knowledge (provided it does not violate the laws within that state.)

Mobile Surveillance verses Stationary Surveillance

Mobile surveillance, obviously, involves following a moving target. Say a target you are tailing gets in his or her car and drives away, you may want to continue the surveillance by using your automobile.

Stationary surveillance is when the investigator stays in one place to observe the target. If a commercial or residential property is being vandalized, a private investigator may be hired to watch the property from a stationary post, like a parked car, to gain evidence of the crime and who the perpetrator is.

Prepare For Surveillance

Know the client’s needs. What is it that the client is trying to accomplish through surveillance? The answer to this question determines what types of surveillance will be needed, the scope of the project and the types of equipment that will be used. Private investigators have to educate the potential client and manage their expectations as investigations are often more complicated and costly than the client anticipates.

Know The Subject

Before performing surveillance, investigators should always complete a background check with comprehensive records research on the target and acquire as much information as possible about them - name, address, phone number, complete physical description, photograph, and relatives in the immediate vicinity. Private investigators will also want to know pertinent background information such as routines, habits, hobbies, schedules and associates.

Know The Area

Private investigators should always have a map of the area where the surveillance will be taking place. If possible, they should also have a photograph of the building they are watching or the location where surveillance will begin. If surveillance is taking place at night or in the early morning, it’s a good idea to visit the site during various periods of the day and night.

Know Your Equipment

The kind of equipment a private investigator uses is contingent upon the nature of the surveillance itself. Private investigators need to get familiar with their equipment ahead of time and practice with it. If surveillance involves a camera or a video camera, prepared investigators will have two of them with backup batteries. Investigators seldom get a second opportunity to capture an activity.

Every private investigator should have a flashlight for working at night, binoculars or a telescope, a tape recorder, two-way radios for team surveillance, a tripod for security equipment, full tank of gas in the car, appropriate attire, snacks and water.

Know Yourself

Private investigators must do what is necessary to prepare their minds for work, like exercise, get plenty of sleep and have a practiced plan. All private investigators should also to be prepared for a situation where they are approached by a stranger or by the police while conducting surveillance. Always have a convincing story ready to tell.

What Every Investigator Should Know About Surveillance

Surveillance is incredibly demanding and challenging. Private investigators who are successful at surveillance have to possess certain qualities. Someone with an outgoing personality, exceptional communication skills, the ability to take action, a good memory, an ability to blend into their surroundings and a strong attention to detail would be a good fit for surveillance. This person should also be honest, patient, observant, resourceful, flexible and focused. Not every person is able to sit for hours and focus on a particular area. Investigators often sit in an automobile for up to ten hours on the coldest day of winter or the hottest day of summer.

Ethics and Laws Relevant to Surveillance

All private investigators should know the laws that may affect their work in their respective states or face a possible prison sentence. Trespassing and audio recording laws are especially important to know. Laws regarding audio recording vary state to state and some states prohibit covert audio recording.

Conclusion

Surveillance is not always necessary in an investigation. Surveillance adds to an investigation when a visual confirmation of the actions or the whereabouts of the target is necessary to concluding the investigation. If an investigator needs to catch a thief in the act, find and confirm the whereabouts of a missing person, or prove a worker’s compensation claim is false, surveillance is necessary.


** An interesting and eye-opening article on the subject of audio recording Broken Record Laws  


Brian Blackwell Investigations