Eavesdropping of confidential conversations in conferences, meetings, corporate offices and private homes has become a real concern to companies and governmental organizations.

The potential damage that can result from the disclosure of research or negotiation results can threaten the existence of companies. Experience shows that a ban on mobile phones for meetings and negotiations is not an obstacle to recording and passing on information.

Small transmitters can be hidden almost everywhere and the transmission ranges are almost unlimited:

  • Transmitters disguised in a power outlet, electricity meter, lamp, light switch, computer mouse, pen, calculator, usb sticks, etc.
  • Bugging devices directly worn on the body
  • Directional microphones, laser ir direction finder systems or microphones mounted on windows & facades

In principle, a distinction must be made between two groups of perpetrators with regard to concealed eavesdropping devices: External perpetrators, e.g. visitors, business partners, service providers, couriers, etc. External perpetrators can be effectively prevented from smuggling in bugging devices by establishing an effective counter-surveillance, monitoring and access control. Internal perpetrators, e.g. employees, maintenance technicians, cleaning staff, etc. Internal perpetrators are usually not subject to extensive access control procedures and can therefore deposit and install bugging devices much more easily.

Unfortunately, many companies and authorities handle sensitive information too lightly. Without special equipment, no effective protection against foreign intelligence services can be guaranteed, as they have professional eavesdropping devices and technology to carry out targeted and industrial espionage. Furthermore, many institutions only act after the occurrence of a damaging event – a foresighted and comprehensive eavesdropping defense planning is therefore essential in order to avoid greater damage.