Digital Surveillance Location Analysis helps detect some of the most difficult bugs used in all areas of illegal surveillance, from marital cases to major economic industrial espionage cases.
Many devices today use GSM (Global System for Mobile communications) which is a digital cellular technology used for transmitting mobile voice and data. Bugs built on top of GSM technology are essentially stripped down mini cell-phones that are easily remotely-controlled by an eavesdropper. They only transmit brief radio signals when on standby resulting in long periods of radio silence – making these devious devices extremely difficult to detect and find.
Rogue Wi-Fi Access Points (APs) pose similar detection challenges.
These electronic surveillance techniques leverage the power of the Internet and cellular telephone system to instantly send eavesdropped voice, data and video worldwide. You might think these devices are expensive and difficult to purchase. Click here for an instant education.
Locating these types of devices is nearly impossible without the proper instrumentation.
Wi-Fi and Cell Phone Location using Digital Surveillance Location Analysis
Murray Associates had a custom solution developed to assist with discovering these digital bugging devices. Digital Surveillance Location Analysis ™, was designed explicitly to ferret out GSM cellular bugs, and devices which use rogue Wi-Fi. Although our Digital Surveillance Location Analysis ™ instrumentation can detect and locate GSM bugs in buildings, it is particularly efficient locating GSM bugs in trucks, aircraft and automobiles.
DSLA captures the signals emitting from the surveillance device, no matter how briefly. Using signal triangulation techniques it displays the relative location of the device to within a few feet!
Have a Question About TSCM?
If you have any questions about Digital Surveillance Location Analysis or the TSCM services provided by Murray Associates, simply fill out the form below, or call us from a safe area and phone.
If you think you are under active electronic surveillance, or believe you have discovered a bug or covert video camera, go to our Emergency TSCM page. The procedural checklist there will tell you exactly what you need to do next.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.