Listening & Recording Devices: Are You Being Bugged?

Listening & Recording Devices: Are You Being Bugged?

Copyright Samaritan Protective Services, Woodbridge, Virginia

Have you had a private conversation with a confidant only to have details emerge later?  Discussed a new technology or product your firm is developing, then learn a competitor is releasing a very similar or identical item?  Does nothing seem to stay within the confines of four walls and your activities are always known?  As surprising as it may sound, you may be bugged!

History Of Bugs:

Despite being considered a high-tech form of espionage (which they can be), technical surveillance has been occurring for some time.  One of the earliest known listening devices to receive a patent in the U.S. was the Dictograph.  This device placed a microphone in one location and a remote listening post equipped with a phonograph for recording.  The Dictograph dates to 1906.

Adversarial nations have been conducting technical surveillance for decades.  It was a staple intelligence collection tactic during the Cold War and continues to remain a viable option today.  Corporate espionage is a very real and dangerous problem for many sectors, especially Critical Infrastructure.  The loss of proprietary information, trade secrets, research and development can lead to significant security and economic damage.

Means of Deployment:

There are three main categories of illicit device deployment:

  • Plug & Play: Quickly and easily plug into a power source after positioning and leave. Designed to transmit information over a specific frequency, such as to a cell phone.
  • Leave & Retrieve: Contains onboard limited power supply, such as with a digital recorder and is designed to be left in a designated area to be surveilled, then retrieved at a later date for data collection.
  • Hardwired: The most complex and difficult to detect, as these devices are typically embedded within appliances, have sustained power supply, require planning and expertise to deploy. Typically placed in areas that frequent conversations such as conference and break rooms.  Are often disguised as fire alarms, radios, TV’s, clocks and many other common office or home devices.

Types of Devices:

Through the years, listening and recording devices have been improved significantly, both in their covert nature and ability to capture detailed audio and video.  They are also easily obtainable, overall inexpensive and easily deployed with minimal skill and training.  Additionally, some usually innocent devices may be used to conduct illicit surveillance activities.  While by no means an exhaustive list, here are a few types of listening, monitoring and recording devices.

  • Two-Way Radios & Baby Monitors: Easily obtainable, cheap and simple to deploy. With a constant power supply, these can transmit indefinitely or until discovered.
  • Digital Recording Device: Very affordable and newer models can record for days and have voice activation, increasing battery life. Must be physically retrieved for exploitation.
  • Remotely Activated Cell Phones: This requires specialized software (apps), physical access to the phone and additional technical skills, however it is completely possible to turn someone’s phone into a remote listening device. Activation of cameras, interception of live phone calls and video messaging is possible with today’s technology.
  • Laser Microphones: These are extremely powerful and prohibitively expensive listening devices that bounce a specialized laser off glass (such as in an office building), detect the vibrations from conversations and send back to the operator for conversion into audio and further exploitation. Extremely rare in the private sector.
  • Covert Audio/Video Cameras: These devices are small, wi-fi capable, inexpensive and easily obtainable from spy shops, eBay and Amazon. They are often designed to be hidden inside other objects such as stuffed animals, tissue boxes, cell phone chargers or other electronic devices.  These can also be hidden on people, such as lapel pins, buttons, writing pens and even shoes.

What is TSCM?

Technical Surveillance Countermeasures (TSCM) is the systematic and comprehensive detection, identification and potential neutralization of illicit recording, listening or monitoring devices.  Proper TSCM is conducted by trained and industry certified technicians with some of the most advanced detection equipment available.  These TSCM specialists have years of operational experience, hands-on technical training and subject matter expertise in the field.

Buyer Beware:

There are countless online spy shops and specialty stores that offer low priced, cheaply made and mostly ineffective “bug detection” gear.  These devices often have flashing lights, gimmicky names and detect very limited frequency bandwidths only inches away.  Do not trust your privacy to toys.  Detection of illicit devices requires numerous specialized (and expensive) pieces of equipment that detect certain types of devices, radio frequency bands, infrared and even microwave transmissions.   From non-linear junction detectors to spectrum analyzers or near field detection receivers and other specialized equipment, the correct devices must be used to comprehensively detect, identify and neutralize covert technical surveillance devices.

Samaritan Protective Services has the trained personnel, operational experience and assets to meet the unique needs of clients nationally and globally.  If you or your organization is in need of a quality and comprehensive technical surveillance countermeasures program, contact us today.  Samaritan’s team of professional risk managers will discuss our portfolio of risk management solutions and how a strategic partnership with us can provide value and peace of mind.

International Travel Security: Considerations for a Safe Journey

Copyright Samaritan Protective Services, Woodbridge, Virginia

International Travel Security: Considerations for a Safe Journey

International travel can be an enjoyable and productive part of life for personal and professional reasons.  For the most part, everyone has to travel at some point to support business, organizational priorities or maybe just a family vacation.  Whether a veteran business traveler or new passport holder eager to see the world, there are some active steps to help reduce risk.  We will discuss some key security and wellbeing considerations while also sharing resources to help ensure a safe and effective trip.

  • Situational Awareness & Blending In: Situational awareness is a learned skill that everyone should develop. Simply being aware of your surroundings and identifying if you may be followed or surveilled can give valuable time to seek assistance or safety.  If something doesn’t feel right, it probably isn’t.  Listen to your gut instinct, as it could save your life.  Additionally, you might be a tourist, but you shouldn’t look like one.  Take note and do research on the area you are visiting, how the public dresses and local customs.  In most situations it is quite easy to spot someone that is not a local.  Opportunistic criminals may specifically target tourists or foreign business travelers due to the perceived ease of access and vulnerability.  Make yourself a “hard target”.
  • Document Control: Never surrender your passport or other important documents to anyone that cannot be verified. If your passport is lost or stolen, contact your country’s nearest embassy or consulate for emergency assistance.
  • Political Considerations:
  1. Corruption & Social Concerns: Many countries have a serious problem with corruption that can affect the safety, security and freedom of movement for foreigners. Additionally, there may be socially acceptable activities in one country that are severely restricted, banned or could put an individual in legal peril in another. For example, there are some countries in which LGBTQ activities could result in prison or worse. Contact your embassy or consulate for additional information.
  2. Government Stability: Some countries are suffering from internal strife, potentially threatening their very existence. The fall of a government would pose many challenges and potential security risks to a traveler. There could be rioting, destruction of infrastructure, a military takeover or loss of basic public services. As an example, just this month the President of Sri Lanka resigned and fled the country due to failed domestic and economic policies, leaving a power vacuum. It is advised to research and assess the nation’s government stability before travel.
  3. Civil Unrest: Along with the previously mentioned government stability, other social and economic consideration could lead to demonstrations and/or civil unrest. France, for example, is well known to have frequent labor strikes and demonstrations that lead to property damage, transportation shutdowns and even violence. Find out what the geopolitical landscape and local issues of the country are, along with planning mitigation strategies prior to your trip.
  4. Intelligence Gathering & Cyber-Security: There are many countries that are not as open and trusting with foreigners. Additionally, some nations actively conduct surveillance, intelligence gathering and signals interception against Western guests. If your travels take you to “unwelcome” territory, you can be all but certain that your accommodations are bugged for listening and/or video recording and more than likely being surveilled. In countries such as North Korea, Russia and Iran, surveillance and control of incoming and outgoing communications is prevalent.

Crime Statistics

  1. Types of Crimes and Targeted Demographics: Crime statistics and types change dramatically with location. For example, Mexico City has a higher rate of petty crimes and theft than Copenhagen. It’s imperative to analyze and be familiar with who is conducting crimes, those typically targeted and assess whether you could fall within the risk spectrum.
  2. Area Specific Crimes: There are areas within countries and even individual cities that have varying levels and types of crime. Some areas might have increased drug related crimes, others may have kidnapping risks to foreigners. Crime is also frequently different between urban and rural areas. It’s important to have an understanding of the risks associated with the specific areas to be traveled.

Terrorism Risks: Unfortunately, there are very few places in the world that have little to no risk of terrorist activity. Often, terrorist attacks are initiated in heavily populated areas such as shopping centers, sports arenas or places of worship. Also, a specific demographic may be targeted. Ensure you have as much information about the overall risk as possible. There are numerous publicly available resources to gain valuable information; some are at the bottom of this article.

Food & Water Safety: Food security and water safety standards are not universal. Some countries, particularly developing nations, have very few food safety regulations and policies. Know where your food is coming from and who prepared it. If in doubt about the safety of the water source, stick with sealed bottled or canned water/drinks. Dry or packaged foods are typically safer due to factory sealing. Avoid raw or undercooked foods that may contain pathogens. If prepared food is considered, ensure it is served hot, as high heat kills the majority of germs that cause illness.

Road Safety & Public Transportation: If you will be driving, be cognizant that road surfaces may not be up to the standard you are accustomed in your home country. As an example, Switzerland has some of the best road surfaces and lowest traffic accidents in the world. In comparison, Madagascar is known to have few paved and safe roads to travel on. If using public transportation, be knowledgeable about the safety record of the subway systems, buses and taxi services. Some older systems in less developed countries do not meet the stricter safety requirements that most are used to in the West.

Availability & Access to Healthcare: Falling ill or suffering from an injury in another country can be frightening and potentially life threatening. Does the host country have adequate and available healthcare? Does your insurance provide coverage for services outside of your home country and are there provisions for emergency evacuation? This is an important consideration that most people forget.

Key Points of Contact: It is very important to have names, numbers and addresses of key contacts within the area of travel. Save contact information for consulates and embassies. Also, know how to reach emergency services. In the United States, the number is 911 but, in the UK, it is 999. Ensure that someone (friends, family or business associates) know where you are and have a way to contact you. In times of emergency, seconds count and knowing how to contact help is critical.

Emergency Evacuation: A key component of any security and risk management plan is to have a way out. Are plans and assets in place to hasten your departure due to an emergency, civil unrest or illness? Do you have an open-ended transportation ticket? Who will you contact to assist evacuate you, your colleagues or loved ones?

Online Resources:

  1. Overseas Security Advisory Council (OSAC) – Provides detailed information on the security, geopolitical and crime statistics on countries around the world.
  2. U.S. Department of State – Issues travel alerts based on updated and relevant information on crime, terrorism, health concerns and more.
  3. CIA World Factbook – A wealth of general information on the history, political nature, geography and people of a country.
  4. UK Foreign Office – The same principle as the U.S. Department of State advisories for travel. Another great source of country specific information and security concerns.

Samaritan Protective Services has the trained personnel, operational experience and assets to meet the unique needs of clients nationally and globally.  If you or your organization is in need of a quality and comprehensive travel security program, contact us today.  Samaritan’s team of professional risk managers will discuss our portfolio of risk management solutions and how a strategic partnership with us can provide value and peace of mind.

Executive Protection: A Critical Component of a Comprehensive Security Package

Executive Protection: A Critical Component of a Comprehensive Security Package

Copyright Samaritan Protective Services, Woodbridge, Virginia

What is Executive Protection?

Executive Protection (EP) is defined as a unique and specialized security program with the primary function of providing for the protection of individuals from tangible and intangible threats or risk factors.  Depending on location and market, EP goes by many names; Bodyguard, Close Protection Operative, Personal Protection Specialist and a host of others.

Typical Executive Protection end users may include some of the following:

  • Corporate Executives
  • Celebrities
  • Diplomats
  • Political Candidates
  • Religious Figures
  • Media Personalities
  • Threatened or At-Risk Persons (Domestic Violence Survivors, Workplace Violence, etc.)

Services are often provided on an as needed basis, such as for special events or when there is an elevated risk due to internal or external factors.  Some Principals require around the clock protection.  Each situation is unique and requires an in-depth analysis in order to provide the needed services.

Who are the “Protectors”?

Capable EP Agents come from a diverse spectrum of backgrounds, providing specialized insight into risk management and the protection of people, property, information and reputations. Most (but not all) are former military, law enforcement or come from the intelligence field. Executive Protection should not be an “entry level” profession and takes years of training, operational experience and maturity to provide the highest level of client service.

Each state mandates specific training and licensing requirements for security personnel, including Executive Protection. Additionally, more advanced training in specialized areas is required.

Some of these may include:

  • Successful Completion of Advanced Executive Protection Training
  • Emergency Medical Technician / Basic Life Support
  • Protective Driving
  • Solo Practitioner Operations
  • Threat & Vulnerability Assessments
  • Advanced Weapons Handling
  • Open-Source Intelligence (OSINT)
  • Concierge & Customer Service
  • Behavioral Analysis
  • De-escalation Techniques
  • Surveillance & Surveillance Detection
  • Estate & Residential Security Practices
  • Domestic & International Travel
  • Physical Security & Access Control

The media and Hollywood often portray a stereotypical Bodyguard in a dark suit, sunglasses with an earpiece and is more brawn than brains.  This could not be farther from the truth.  Successful and experienced practitioners utilize intelligence, analysis and threat detection to navigate the risk landscape for clients.  The primary function should always be to detect, monitor, mitigate and avoid risks as opposed to responding to them.  While risk can never be truly eliminated, with proper planning and coordination it can be significantly reduced.

An Effective Team Integration

To ensure efficiency, productivity, safety and client satisfaction, Executive Protection personnel should be integrated within the team.  This can and should include Corporate Security Managers, Human Resources, Facility Managers, Personal Assistants and even Home Office Staff (Butlers, Nanny’s, Estate Managers, etc.).

EP practitioners should be viewed as trusted partners dedicated to the success of the organization, individual or family they serve.  They have a specialized but enormous responsibility to the Principal.

Is Your EP Program Effective?

Some organizations have in-house security and protective services.  Some have none and others outsource due to a number of reasons.  Many factors play a part; financial, perceived need or lack thereof, company culture and desires of the protectee.  Does your EP team have the required training, licensing and experience? Are they effective members of an overall risk management strategy? Have you considered the risks in not having an established program in place?

Samaritan Protective Services has the trained personnel, operational experience and assets to meet the unique needs of clients nationally and globally.  If you or your organization is in need of a quality and comprehensive EP program, or you are not pleased with your current one, contact us today.  Samaritan’s team of professional risk managers will discuss our portfolio of risk management solutions and how a strategic partnership with us can provide value and peace of mind.

Contact Samaritan Protective Services today for a free consultation.

Samaritan Protective Services is located at 3985 Prince William Parkway, Suite 203, Woodbridge, VA 22192. Founded in 2015, we specialize in Executive Protection, Corporate Security, Workplace Violence ProtectionBodyguard, Armed Security, Close Protection, Security ConsultingSecurity for places of worship, Dignitary Protection, Celebrity ProtectionEvent Security, Private Investigations, TSCM, Armored Car, Surveillance, Counter surveillance, Secure Transportation, VIP Protection Services, Intelligence and Risk Advisory, Emergency Response and more.

Residential Security: More Than Just Preparing For Unwelcome Guests

Residential Security: More Than Just Preparing For Unwelcome Guests

As professional risk management consultants, we are often tasked with estate security for clients. This can range from providing a risk assessment and recommendations to providing comprehensive solutions for the property and those residing there. This can be both a daunting and thankless job for those new to residential/estate security. It is quite different from the mobile assignments we all love, but just as important to the protection of a Principal and their family.

When conducting assessments, some Executive Protection personnel immediately focus in on preventing outside threats such as intruders, stalkers, paparazzi and the like. While this is important (it might be the compelling reason we were retained), it is not the limit of our concerns. We must take a holistic approach to security and “all-hazards management”. Our charge as protection specialists is, well, to protect….from anything that could affect the wellbeing of our client.

In addition to physical security, passive measures such as CCTV or remote monitoring, consider the following vulnerabilities when assessing a residential environment:

Fire Prevention – A home fire is a very dangerous and costly incident that can be mitigated to an extent, with the proper planning and resources. Does the home have active and serviceable fire detectors? Are the fire detectors merely to alert residents of fire/smoke or are they tied in with the security system that is monitored for response? Given the large size of some estates, some have opted to install automated water sprinkler systems. Depending on the materials the structure was built with and size, this might be an added value. Are other adequate fire suppression devices, like extinguishers in the home? Vulnerable areas such as garages, kitchens, workshops and basements should have quick access to a fire extinguisher.

Also take into consideration things in the home that can be a fire hazard. Are there fireplaces that need cleaning or maintained? Are there tapestries, drapes or other flammable items that pose a hazard?

Carbon Monoxide – Carbon monoxide is a scentless and tasteless gas that prevents oxygen from being retained in red blood cells, causing tissue and brain damage as well as leading to death if not properly treated. Broken items in the home such as a furnace can leak carbon monoxide and lead to tragedies. Some fire detectors come equipped with carbon monoxide detectors as well. This is something to think about while addressing fire mitigation solutions.

Estate Maintenance – While not typically at the forefront of a protection specialists mind, the overall maintenance of the property and structures on it are of concern to us. Has a recent storm caused damage to the roof, security gates or backup generators? Is the home older, requiring renovation or eradication of a mold problem. Does the property have sufficient lighting during hours of darkness? Don’t be afraid to ask these questions to the Estate Manager or other responsible party. Large residences require significant upkeep and maintenance. Just like with any home, small issues can grow into larger ones as time progresses.

Vehicles – We are typically tasked with driving a Principal, possibly in their vehicle. Have we determined that maintenance is up to par? Are there potential recalls that could affect the safety of the vehicle(s) in question?

Locks – More in line with typical physical security concerns, locks (door, gate, garage, etc) pose a significant challenge to ensuring the security of the residence. Do all locks and keys work correctly? Do any lock mechanisms jam or have they been damaged by weather or other means?

An estate requires different people and staff to run effectively. When personnel resign or are terminated from their positions (security personnel included), are locks and gate combinations changed? Any combination should be changed at regular intervals to enhance security. While inconvenient at times, it can be a powerful means of keeping the good guys in and the bad guys out.