Spy
Search for listening devices
The main reason for the industrial (economic) spying is the striving for the realization of competitive advantages - an essential condition for success in a market economy. The information extracted in this way Allow to keep track of Competitors To Use Their Scientific and Technological Achievements, based on what may the most rational decision-making, saving funds for Their Own R & D and basic research. Economic espionage can be conducted with a view to mastering the markets, counterfeiting, defamation or economic suppression of competitor, the breakdown of Negotiations on the Conclusion of contracts, black mailing Individuals, etc.
Intelligence activities are Often Competitors with the help of special technical MEANS tacit information (STSNPI), All which are defined as hardware, specifically designed to be overused for Obtaining or secret information (secret Means of visual observation, acoustic control secret, secret communication channel from eavesdropping and pr ..) or illegal covert listening (cell phone spy software) is in general no one is immune. And a Legitimate Interest in Preserving the economic entities of its own trade secrets.
Galanthus The Rights of Citizens and legal persons to confidential information, identification mode to access it and how to protect Their National Legislation. By Implementing this right, Citizens and legal persons May identify channels or leakage of confidential information, search for the so-called stowing equipment in His office, office, apartment, car, etc., used for this purpose special measuring equipment and retrieval.
By stowing device (memory), in general, include any Technical Means, first quietly posted on the site or in its communications to tacit information (acoustic, visual, textual, computer). Ash stowing devices can be used:
microphones with remote transmission of information;
Stethoscopes with remote transfer or accumulation of information;
sonar sensors;
mikrovideokamery with remote transfer or accumulation of information;
endo-scopes;
device information retrieval systems with communication lines (phone Bookmarks, phone numbers - observers, etc.).
The list of memories is not Exhaustive, Such as new types of devices.
Protection of stowing device Has Two main areas:
Spy search and discovery of the memory;
neutralization of the memory.
Will discuss this article the main methods of search and detection equipment stowing.
As a spy known a great many different kinds of memory, as well as options for Their Use, Their search and discovery is a separate branch of knowledge. In general, all methods for detection of memory can be Divided write generic and specific. Generic methods can be overused to detect any storage, and special - for the detection of 'certain types of memory or installed into Certain Circumstances.
The universal detection device stowing Spy include:
visual inspection;
nonlinear location;
metallodetektirovanie;
X-raying.
Visual inspection is a spy Thorough inspection of the premises, structures, communications, interiors, equipment, stationery, etc., by a special procedure. In this case, Particular attention is drawn to the presence of specific symptoms stowing device (antenna, microphone hole, etc.). During the inspection, as a general rule, the required Dismantling or disassembly of equipment, communication equipment, furniture and other items. That specialist searches the memory, You Should Be familiar with the look and design features or Commercially available memory, as well as an understanding of the structures or amateur radio. Must have experience working in information security.
Spy In the process of visual inspection, use a mirror if Necessary Inspection, lighting equipment, endo scopes, etc.
Method of nonlinear location is Realized by Using special devices - Nonlinear locators - and based on the specific properties of semiconductor materials, All which lies in the fact thats the high frequency signal That Their exposure is converted to the frequency of multiple harmonics with Subsequent re- Into the emission environment.
Unlike most other methods of nonlinear radar capable of detecting:
broken charger (with power Turned off);
Charger with remote control, are in standby mode;
Storage technologies, with special communication, employee increasefontsize secrecy of Their Work (narrowband modulation, signal transmission with short series after preliminary accumulation in the storage, use or multiple carrier frequencies, a variety of complex modulation formats, etc.).
This feature of the nonlinear radar or great practical Importance Because it Allows for search operations do not take account key in the ability to remotely disable the memory-party eavesdropping, but Also Increases the probability of finding the memory.
At the sametime with a nonlinear radar can detect so-called semi-active tabs That do not containerization semiconductor components. These tabs are overused Relatively infrequently.
The method involves searching through the memory metallodetektiroviniya use of metal detectors (metal detectors) Reacting to the metal chassis or other metal parts backfill device. This method HAS Limited Applicability, since in practice there is always room in a large number of metal objects, All which create interference to the detector. With the help of metal detectors are non-metallic objects Usually surveyed (furniture, wooden or plastic building construction, brick walls, etc.)
X-ray radio-graphic method has been overused to detect all types of storage on the premises, as well as electronic equipment. When the inspection of building structures, furniture and other objects in the room overused by Laptop Inspection complexes "Bumblebee-80 / A" or "Bee-90 / K" (Russia), All which are Equipped with visual device shine through and allow the layer of steel up to 2 mm and a layer of concrete up to 100 mm.
When the inspection or electronic equipment, with a stationary or portable medical x-ray machine, made photographs of equipment units and blocks in X-rays. In These images show the internal topology of the equipment. The photographs are compared with standard topographic images of accommodation or thesis units and blocks. When topo mismatch accommodation Conclude the existence of memory in hardware.
There are a number of special methods for detection, or stowing devices. These include the following:
radioskanirovanie;
indication of the electromagnetic field;
interception;
analysis parameters and lines or wire communications; reflectometry lines;
infrared sensing, etc.
Methods radioskanirovaniya, indication of the electromagnetic field and radio intercepts are overused to detect the radio-emitting memory.
Ridioskiniroviniya method is narrow-band radio reception, at a Given Frequency range, consistent with movement on the frequency scale.
Identification of the source signal is Typically "by ear". Radioskanirovanie can be done in manual and computer mode. Radioskanirovanie manual, makes it Possible for large labor-intensive, it has been overused to find the memory, the frequency range which is known at least approximately.
In Implementing radioskanirovaniya and some other methods of detection devices, backfilling, as a rule, use the technology to initiate a memory That is triggering Their work by generating a known sound (for example, play a tape recording, computer speaker initiation, etc.) .
If the frequency range of the source signal is unknown, a broadband ridiopriem. This method involves taking the superposition of radio signals over a wide frequency range with a special wide-band receivers. The total radio signal detected on the cell phone spyware. Listening to the radio operator Allows the Experienced to Infer the presence of memory, initiated by renowned audio signal.
The quality and intelligibility of the signal is largely Influenced by background noise, so the signal level Should Be Sufficient for Distinction and its identification. This makes it important thats the Operator Should Be close enough to the source signal, other wise the detection and monitoring of the Latter Will Be Impossible.