Develop a Step-by-Step 2022 Reporting Process for staff to follow if they suspect corporate espionage is happening
Report your concerns to the appropriate team member
Restrain yourself from attempting to find a device yourself, detecting bugs is difficult even for the professionals who specialize in TSCM
Establish a security procedure for the concern that your office may be bugged.
Include in your basic employee training a specific process for reporting a suspicion of corporate espionage. This procedure is as important as any high security reporting process, chain of custody is paramount to maintaining secrecy.
Techniques to implement these processes into an organization vary depending upon its size and structure but this process will be similar to a "whistle blower" or "employee theft" reporting procedure.
CES provides easy steps to better protect your organizations privacy
Share on Facebook Share on LinkedIn
Technology is constantly evolving. The technical aspects of Eavesdropping, (audio, video, cell phones, computer spy ware and GPS devices), has grown and these devices and methodologies are becoming easier, cheaper and better.
Only you know if you have reason to believe whether someone is listening or watching, and if you think they are, then they probably are. Technical Surveillance Countermeasures or TSCM, is also known by the reference of a Bug Sweep, TSCM Bug Sweep, and the more modern name of Electronic Eavesdropping Detection or EED. We are Certified Specialists in the detection and location of eavesdropping devices.
In Minnesota as in most states, you need to be a licensed Private Investigator to conduct a corporate bug sweep. We are licensed to do so, which allows us to do compete consulting work while protecting your interests. We operate the latest REI counter-eavesdropping equipment and can ensure complete confidentiality.
GBI offers a wide range of counter espionage and TSCM services
A Technical Surveillance Countermeasures or TSCM Sweep is a service provided by highly qualified personnel to detect the presence of surveillance devices and to identify technical security vulnerabilities of the site in question.
GBI uses proven techniques & decades experience in Counter-Surveillance & Technical Security Counter Measures (Bug Sweeps) to secure our clients locations