Electronic
Countermeasures

Corporate Espionage
is very common!
What we do for
our clients is
always
confidential,
often
privileged
and in
some cases
classified..
The Dangers
Clandestine eavesdropping on your office and home telephone calls.
Covert audio/video of your meetings and conversations;
The Consequences
Theft of your proprietary information by rivals, competitors and foreign governments, can seriously damage or destroy your business.
Detection requires
sophisticated equipment and specialized skill sets
IBIS has been providing EECM Sweeps and Computer Forensics since 1976. We have done thousands of sweeps across Canada, the USA and in many other countries. IBIS equipment and technology is state-of-the-art and constantly updated. IBIS countermeasures teams are experts in detecting covert surveillance devices.
IBIS is one of the very few Countermeasures providers with the
advanced skill sets and state-of the art software able to sweep VoIP Phone systems for Taps, Data Packet Intercepts and other attacks. VoIP sweeps are now a standard weapon in the IBIS Countermeasures arsenal.
Our
Services Include:
Electronic Eavesdropping Countermeasures, EECM, Electronic
Eavesdropping Detection, Technical Surveillance
Countermeasures, TSCM Services, TSCM Surveys, De-Bugging
Sweeps, Bug Sweeps, Bug Sweeping, Wiretap Detection, Computer Forensics,
Corporate Espionage, Detecting Covert Surveillance Devices,
Electronic Countermeasure, Counter Surveillance Specialist
Contact us now for further Information
Ottawa
(613) 258-9377
and Toronto
(416) 362-3009
telephone
numbers to the TSCM section
Specialists in Detection
Services
-
-
IBIS has found hundreds of illegal spying devices including:
-
Scores of Bugs:
(Acoustic, Rf, Optical, VLF, Ultrasonic and Hybrid transmitters)
Dozens of wire-taps
Soft, Hard, Inductive, Covert or hidden in plain sight
Devices and Software
to compromise Computers and access sensitive data.
VoIP Sweep: an attack was detected that was captured and
copied all data packets to and from a a Senior Partner's IP
Phone and directed them to a temporary employee's desk on
another floor. The copies of the data packets were then
automatically converted into audio files and recorded.
Pinhole Microphones,
Spike mikes, Harmonica bugs and Induction coils
Wireless video cameras
broadcasting Both Audio and Video
Laser eavesdropping systems
Modulated,
(non-laser), light beams
A bug that cost $39.95
installed by a jealous co-worker
A bug that cost $39,000.00
installed by a crack team of foreign intelligence agents
A line carrier
built inside the electrical Wiring cable in a Bank’s server room
Remote systems
to secretly activate laptop cameras
Spread spectrum -
Burst Transmission and Frequency hopping systems;
Telephone transmitters;
- and a myriad of other devices, systems and methods of attack against our clients.