Countermeasures - TSCM
is very common!
What we do for
our clients is
Clandestine eavesdropping on your office and home telephone calls.
Covert audio/video of your meetings and conversations;
Theft of your proprietary information by rivals, competitors and foreign governments, can seriously damage or destroy your business.
sophisticated equipment and specialized skill sets
IBIS has been providing EECM Sweeps and Computer Forensics since 1976. We have done thousands of sweeps across Canada, the USA and in many other countries. IBIS equipment and technology is state-of-the-art and constantly updated. IBIS countermeasures teams are experts in detecting covert surveillance devices.
IBIS is one of the very few Countermeasures providers with the
advanced skill sets and state-of the art software able to sweep VoIP Phone systems for Taps, Data Packet Intercepts and other attacks. VoIP sweeps are now a standard weapon in the IBIS Countermeasures arsenal.
Electronic Eavesdropping Countermeasures, EECM, Electronic Eavesdropping Detection, Technical Surveillance Countermeasures, TSCM Services, TSCM Surveys, De-Bugging Sweeps, Bug Sweeps, Bug Sweeping, Wiretap Detection, Computer Forensics, Corporate Espionage, Detecting Covert Surveillance Devices, Electronic Countermeasure, Counter Surveillance Specialist
Contact us now for further Information
Ottawa (613) 258-9377 and Toronto (416) 362-3009 telephone numbers to the TSCM section
Specialists in Detection
IBIS has found hundreds of illegal spying devices including:
Scores of Bugs:
(Acoustic, Rf, Optical, VLF, Ultrasonic and Hybrid transmitters)
Dozens of wire-taps Soft, Hard, Inductive, Covert or hidden in plain sight
Devices and Software to compromise Computers and access sensitive data. VoIP Sweep: an attack was detected that was captured and copied all data packets to and from a a Senior Partner's IP Phone and directed them to a temporary employee's desk on another floor. The copies of the data packets were then automatically converted into audio files and recorded.
Pinhole Microphones, Spike mikes, Harmonica bugs and Induction coils
Wireless video cameras broadcasting Both Audio and Video
Laser eavesdropping systems
Modulated, (non-laser), light beams
A bug that cost $39.95 installed by a jealous co-worker
A bug that cost $39,000.00 installed by a crack team of foreign intelligence agents
A line carrier built inside the electrical Wiring cable in a Bank’s server room
Remote systems to secretly activate laptop cameras
Spread spectrum - Burst Transmission and Frequency hopping systems;
- and a myriad of other devices, systems and methods of attack against our clients.