Deutsch | English

Actual forms of attack and its corresponding methods of defense we will reveal to you together with a few illustrations on this page:

There are unmeasurable possibilities of interception attacks as you can see by the below shown picture. The attack can occur wireless or along wires. Either way the attacker has the possibility to transmit, record, evaluate and transfer words and pictures without being recognized.

Great dangers can be produced by masked mini-transmitters in ashtrays, ball point pens, multiple sockets a.s.o, but also by the tapping of data and telephone lines. Video bugs are also becoming more popular; weak points can be found anywhere in your premises.

Just nowadays, when more and more businesspeople have decided to meaningful encrypt their telephone conversation, faxes, E-mails and video conferences, an interceptor is only enabled to attain the “not yet encrypted” valuable data and conversation through internal informtion lines.

You would be shocked, how easy it is, to have you intercepted frequently !

Here we will introduce to you a basic choice of of control resp. electronic attacking methods, since the possibilities are enlarged resp. furter developed day by day.

It is almost impossible for us to advise you of all combination possibilities for devices in espionage attacks because the limits of execution are only stopped by your imagination, your special knowledge and your portfolio.

Moreover we would like to memtion that unlocking devices for all kinds of doors resp. doorlocks exist since many years, with no traces left behind. To see such a small tool in action will leave you sleepless. You can ask key services in your area.

 

 

 

 

 

 

“Bugs” Mini-transmitter


Mini-Recording Tape


Electronic Stethoscope


Radio by Wire


Permanently wired room microphones


Directional Microphones


Telephone Bugs


Camera bugs


Fax Monitoring System

 

 

“Bugs” Mini-transmitter

FUNKTION:

Hidden, masked room microphones will transmit conversation via radio, range from 20 m to 5 km.Connected to scanner mobile unit range worldwide. Power supply usually by battery, but also by power-line and telephone net or solar cells. Passive bugs do not need a built-in power support. The power used is transmitted from outside.

HIDING PLACES:

The electronical Hardware is very small and can be hidden in each cavity, in double ceilings, double floors, furniture, electronical devices or plants. The success of the attacker depends on his experience and creativity.

EXPENDITURE:

The installation is very easy. Simple bugs are available for 100 Euro. Very popular are hidden installations (for example in electronical presents like watches, pocket calculators) which are placed in the surrounding of the victim by himself.

PERPETRATOR:

Each person with access to business/conference rooms. Employees, visitors, cleaning/service personnel, craftsmen. In fact everybody with a strong motivation is able to enter the target rooms, if they are not strong secured.

 

Back to the general map

 

 

Mini-Recording Tape

FUNKTION:

Very small devices which records conversation. A recording tape not bigger than a bankcard is able to record 3 hours, the smallest unit in a pencil records minimum 70 minutes.
Newer products have digital record times of more than 4 hours.

HIDING PLACES:

Almost always visitors are bringing tapes along to record confidential talk. These devices are carried along close to the body, in briefcases or built in other conference utensils (The thermos bottle is winking).

EXPENDITURE:

Every amateur can make use of such mini transmitters. One such instrument in the size of a checking card starts at about € 300.00.

PERPETRATOR:

Visitors who want to secretly record the spoken words.

Back to the general map

 

 

Electronic Stethoscope

FUNKTION:

The attacker uses for example a radiator or the whole wall as a microphone. Sound waves, forcened for example by the body of a radiator, are recorded, filtered and made audible.

HIDING PLACES:

The attacker usually is located in a neighbor room. Very effective places are as well logistic shafts which are constructed vertically through each floor.

EXPENDITURE:

Top products are able to guarantee a brilliant audio quality, they cost around 2.000€. Weaker units are available for 200€.

PERPETRATOR:

Each person with access to the specific rooms. This procedure works even through a glasswall or window. Internal and external attackers possible.

Back to the general map

 

 

 

Radio by Wire

FUNKTION:

Functions within the building. The longitudinal-wave transmitter uses the 220-Volt power lines as an antenna and receives the power from the power net. These power net bugs therefore don’t need batteries. They are especially suitable for a long-lasting “data connection” (This babyphone technique is well known by every father).

HIDING PLACES:

Built in 220-V electronic devices. Very often interceptors change actual against specially prepared devices or implant this small transmitter while repairing it or during favorable updates. Most likely is the fitting into well known trade multiple sockets (Is offered ready for use via internet including manual since years).

Tip: One should check the junction sockets in their rooms !.

EXPENDITURE:

Additional receiver systems are needed with bugs (is simply put into anyone socket in the house). This system is from € 500 – 1,000.

PERPETRATOR:

Visitors, engineers, employees. The reception is only within the building.

Back to the general map

 

 

 

Permanently wired room microphones

FUNKTION:

The classical Stasi-bug is often permanently installed during the erection of a building. Conversations are intercepted from a stationary interception unit in the building, evaluated and transmited.

HIDING PLACES:

These room microphones are mostly placed in ceiling panels and wall cavities.

Expenditures: Can only be achieved with high expenditures, but then unlimited working and service life.

PERPETRATOR:

Professional interceptors in embassies and foreign country-offices, hotels and especially conference centers, first class passengers in airplanes of certain airlines (we will not mention a special airline hiere !) a.s.o.

Back to the general map

 

 

 

Directional Microphones

FUNKTION:

The sound is captured by a parabol directional microphone and standard directional microphone. The sound-waves are repeatedly amplified, filtered and evaluated just like body sound microphones.

HIDING PLACES:

The interceptors are on the watch in the surrounding area on benches and direct the tip of their umbrella unnoticed toward you or your open office window. This tip of the umbrella, secured with a small casing while taking a walk, is the actual directional microphone (Umbrellas are naturally made for interception, shooting and avoiding rain).

Expenditures: Every amateur can point this directional microphone at you. Simple application. Efficient devices start at approx. € 400.

PERPETRATOR:

If amateur or professional, everyone is capable.

Back to the general map

 

 

 

Telephone Bugs

FUNKTION:

The perpetrator clips it directly onto the telephone lines, which also provides the power. The transmitter is activated when the receiver is lifted off the phone or permanently observes the room in matters of sound waves or is activated from outside.

HIDING PLACES:

Telephones, telephone connecting sockets, within our outside the telephone lines of the building (distribution box, switchboard of the telephone company).

Expenditures: A trained amateur can easily place the sugar-cube sized telephone bugs. Price starting at approx. € 150 including manual.

PERPETRATOR:

Service engineers, husbands, in the end everyone who knows how to buy at the internet (You also know how an internet shop functions, don’t you ?)

One has to assume high criminal energy of the perpetrator when installing them into distributor boxes.

Back to the general map

 

 

 

Camera bugs

FUNKTION:

Hidden camera bugs transmit audio and video signals via radio with a reach of 20m up to 5km.
In connection with a reciever-mobilephone-unit it has a global reach. The power supply is mostly done by battery, power net units are also available.

HIDING PLACES:

The cameras are very small, not bigger than a thumbnail, and can be hidden in each cavity, in double ceilings, double floors, furniture, electronical devices or plants. The success of the attacker depends on his experience and creativity.

EXPENDITURE:

The installation can be done very quickly. If installed in a wall clock or in a computer monitor, the infected object will be placed well visible in the specific room.
Pre-installed radio camera systems in ceiling panels for double ceilings have just to be replaced with the original above the target working place. This will take a maximum of 30 to 60 seconds installation time.
Simple systems are available for 50€ and are very often installed in business presents or other gifts.

PERPETRATOR:

Each person with access to the specific rooms like employees, visitors, cleaning/service personnel, craftsmen. The attacker could also carry an active hidden system at his body (i.e. tie or pencil). He will be able to copy each document or information in his view in realtime.

Back to the general map

 

 

 

Fax Monitoring System

FUNKTION:

This system additionally controls all incoming and outgoing fax messages on paper or hard disk without participants taking notice.

HIDING PLACES:

This device is directly connected to the fax line (telephone line), the same as the permanently installed telephone bug.

EXPENDITURE:

Fax monitoring systems start at € 4,000.

PERPETRATOR:

Professionals who act on purpose and can spend enormous amounts of money.

Back to the general map

 

 

 

As already mentioned, this is only a short list of espionage utensils which can be acquired by everyone and is only a short overview for you concerning the aforementioned matters. If these individual methods of attack are usefully combined together, the perpetrator achieves a highly effective and secure espionage attacking method (e.g. bug is hidden in the office, scanner is positioned three floors above it in the hinged on ceiling of a room and transmits the conversation to a mobile phone or landline, perpetrator is located overseas and is happy about the upcoming video conference).