Deutsch | English

Only such a person can defend who has learned to attack and therefore realistically can evaluate the points of attack. For the effective defense one has to be able to estimate the technically possible and financially justified possibilities of the interceptor.

The actual overview over the internationally procured espionage utensils, as well as the constant contact to the producers of anti-interception devices can guaranty a realistic evaluation of the situations with the clients. Mr. Huth therefore visits very often the development laboratories of various producers. Only the constant contact to these developers and amateur constructors can prevent one from the daily growing development of electronic and system devices in this area and thereby the interceptor can be slowed down.

Effectively defending means to let the interceptor believe that one did not notice the interception attack resp. did not think about it nor do not want to fight against it. An interceptor awaiting the research of his espionage case, will naturally try to remove, to destroy or at least to deactivate the signs of his attack. The latter causes e.g. the disconnection of the well tried remote controlled bugs of the transmitter unit. The discovery of a non-transmitting bug is much more sumptuous than the detection of an active mini-transmitter. Whereby the many different kinds of bugs display a lot of the attacking techniques, but only the variety of the intercepting attacks and thereby the kinds of attacks depend only on the imagination and the financial means of the attacker.

Who knows that the documents or pictures processed on his computer screen can be easily reproduced in real time on another screen only by evaluating the betraying high frequency emissions (certainly in computer-aided-design quality). This way any trained television engineer or blessed amateur can look onto the price calculations of his neighbour craftsman in real time.This betraying emission, a not to be neglected information loophole, naturally should not be overlooked by the monitoring cameras. The defending measure against this kind of espionage is very unspectecular and nevertheless very important. One only has to know about it and constantly keep an eye on the further development of this kind of attack.

The devices, still defending today, can be obsolete in a few days and thereby be a higher danger potential than the unknowingly neglected defense measures. The businessman, feeling safe with his obsolete, non-functional defense device, comes in quite handy for the intercepting attacks of his competitor.

Not only the actuality but also the quality of the installed interception protection measurements are of crucial meaning. Whoever believes that he can start for instance with a broadband detector or a field strength measuring device worth a few hundred Euros serious electronic counter measures, should invite the interceptor immediately into his private premises. This way both of them can spare the costs for the techniques and the interceptor gets what he wants.

To seriously and effectively handle interception counter measures, is essentially more cost intensive than to proceed an interception attack. While for an interception attack one can decide for one measure or a combination of effectively installed auxiliary devices, an effectively installed electronic counter measure has to defend all possible kinds of attacks resp. detect them. This presumably acquires solid expertise but also electronic units enabling one to evaluate a broad spectrum of all possible methods of espionage attacks and techniques. Functional counter measuring equipment cannot be acquired for an amount below a five-digit Euro, leave alone the expertise while reading a manual.

Electronic counter measures were successful either when one has detected an interception attack or can with high probability exclude such an interception attack at this point of time.

One hundred percent security cannot be achieved in this field, but one can – with an experienced partner at his side – effectively and solidly attack a data-GAU and thereby fight against the more frequently appearing thefts of information in our society.

Our knowledge for your security and future.