Your eavesdropping snoop can be stopped.
You don’t have to put up with eavesdropping, hidden cameras, wiretapping, GPS tracking, or other electronic surveillance. You can regain your former privacy.
The problem is, most people don’t know the best first step to solving their personal privacy problems.
Tip: The first step does not involve hiring a Technical Surveillance Countermeasures (TSCM) bug sweep team.
The real best first step is FREE. You can do-it-yourself. And, it will likely resolve your eavesdropping snoops problems once and for all.
“Why not conduct a Technical Surveillance Countermeasures bug sweep for electronic eavesdropping first?”
- Even if an eavesdropping device is found, all you really have is a piece of hardware. Your eavesdropping snoop remains free to do it again. (Tip: They will be sneakier the next time.)
- If an eavesdropping device isn’t found, all you really have is continued uncertainty and… less money.
- Your information loss may not involve electronic surveillance bugging or tracking devices. Leaks can occur in a variety of non-electronic ways, too.
Make these your primary goals…
- Prove your information loss is real.
- Prove the information could only have been obtained via illegal means.
- Determine the methods, or techniques, were used to obtain your information.
- Show a ’cause and effect’ relationship between the criminal and the crime. This means collecting circumstantial evidence which proves the eavesdropping snoop is the culprit.
Here’s the plan to accomplish your new goals…
Leaks of your private information can be verified and tracked to their eavesdroping snoop source.
Conduct each of the following Spybuster Tip #303 tests. Use a different, very specific, piece of information each time. Think of this as a sting operation, and you are laying out bait.
The type of electronic eavesdropping, or other form of snooping, your eavesdropping snoop is using will be revealed. You will know by which tidbit of your bait information surfaces and gets back to you.
Spybuster Tip #303 — Test for Leaks!
- Selectively salt one-on-one conversations with unique bits of information, unique to each person. Use a different bit of information each time. This will reveal loose-lips and false friends when the information surfaces.
- Prearrange a telephone conversation with a trusted party. Discuss one unique and interesting item. If word gets out, you can suspect a wiretap, or smartphone spyware. Although it is not likely, it is possible the wiretap or spyware may be on the other end of the call. Do this with a trusted person who you know would not be tapped. Remember, never use the same piece of information twice. Keeping a written log will help you to help keep track. It may also be valuable later in legal proceedings.
– To flush common spyware from an iPhone, simply reload the iOS operating system.
– To test Android phones for spyware, try this for starters.
– Prevent problems in the first place by reading our smartphone security checklist.
- Simulate one side of a phone call, landline or mobile. (You do not really have to use the phone.) Pretend you are talking to someone. Mention something which is likely to get back to you. This test reveals if there was a room bug or voice recorder in the vicinity of where you were talking.
- Create interesting notes to leave on a table or desk overnight. When word gets back you will know you had a snoop, and on which night.
- Create interesting notes to leave crumpled or torn in half in the trash can. This detects surveillance via garbage archeology—a very common spy trick used by snoops, private investigators, and economic espionage spies.
- Drive to an unusual location, keeping your mobile phone turned entirely off. If word gets back about where you went, suspect a GPS tracker, or private investigator conducting surveillance.
- You can also solve your concerns about video voyeurism yourself. Just learn a little bit about where to look and what to look for. You can find an on-line, self-paced, video-based, spycam detection training course, here. The course is entertaining and takes about an hour to complete.
This group of tests is suitable for most situation. Your particular situation may require a slightly modified approach. Now that you understand the basic strategy for stopping eavesdropping snoops, you can come up with your own plan.
Keep a written log of your tests, and the reactions they may create. Also, include in your notes observations which seem suspicious (people, vehicles, etc.). Of course, don’t do anything which would jeopardize your personal safety, or tip your hand. Include: dates, exact times, descriptions, circumstances, and photos (if possible).
By conducting these spot-the-eavesdropping-snoop tests you accomplish several things…
- You determine if information loss is occurring. If so, you determined the cause of the loss; by electronic surveillance, or non-electronic means …instead of by coincidence.
- Your test will indicate the method your eavesdropping snoop used (cell phone spyware, room bug, GPS tracker, etc.).
- You will have a written log of circumstantial evidence which ties the eavesdropping snoop to the crime.
Important – If you are getting positive results, conduct more tests using different pieces of information each time. You want to collect at least three positive tests. This refutes an eavesdropping snoop’s “just a coincidence” defense upon being accused. Your three (or more) positive tests will make that excuse look stupid.
The end result of your spot-the-eavesdropping-snoop tests will be…
- You will know for certain if electronic eavesdropping is really taking place.
- The bugging technique used.
- And, you may be able to prosecute a case against the eavesdropper.
Once you have enough circumstantial evidence, take your documentation to an attorney. Ask for recommendations on the best way to proceed with prosecuting your case (criminal, civil or both).
History proves, an eavesdropping snoop officially accused of their actions, ceases the eavesdropping, snooping and stalking.
Kevin D. Murray CPP, CISM, CFE is a business counterespionage consultant and TSCM specialist with over four decades of experience.
Murray Associates is an independent security consulting firm, providing eavesdropping detection and counterespionage services to business, government and at-risk individuals.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.