Loading...
Home / RF Counter Surveillance
RF Counter Surveillance2018-10-12T10:13:54+00:00

RF counter surveillance – Securing your facilities

Protecting a secure or sensitive facility doesn’t just involve physical security, it also needs to be protected from electronic surveillance. The security of your facility, your private conversations, your plans and secrets, can all be compromised by small inexpensive surveillance devices (GSM bugging devices are available today from well-known online retailers for less than $50).

Modern surveillance technologies are highly discreet, highly capable and very difficult to locate. Even the smallest device can pack in a considerable amount of technology. They can be integrated into USB cables, light bulbs, or any number of other common objects. When not in use, the device can lie dormant. If connected to a mobile network, it may only need to handshake momentarily once every 8 hours (network defined); at other times it remains RF invisible.

The consequences of undetected RF surveillance and data transmission include: financial losses to corporate organizations, compromise of law enforcement and intelligence agency operations and eavesdropping on what should be secret government conversations by hostile state actors.

Small camera bug

Small camera bug

Beyond bug sweeping

Modern surveillance technologies are highly discreet, highly capable and very difficult to locate; they are often able to evade the methods of traditional TSCM (Technical Surveillance Countermeasures) sweeps. Devices that only transmit in short infrequent bursts, frequency hop, or devices that are ‘hidden’ close to a high-power signal are just a few of examples of how eavesdropping devices can avoid detection by your sweep teams

The traditional approach is to use a hand-held bug sweeping tool. This tool is moved through a room to scan for the presence of a bug. Such sweeps can easily be defeated by a device using the above techniques to avoid detection.  And of course, a device can be switched off during a sweep, or placed after a sweep is conducted.

To provide complete assurance against RF surveillance, there is a need for continuous real-time TSCM in the form of an In-Place Monitoring System. This is where the RFeye Guard system comes in.

RFeye Guard

The RFeye Guard continuous TSCM monitoring system is a cost-effective alternative to bug sweeping strategies with guaranteed detection 24 hours, 365 days a year. RFeye Guard continuously monitors to instantly detect suspect signals in real time. Fast sweep speeds and exceptionally low noise figures allow our RFeye sensors to detect even the lowest power and shortest duration signals. These intelligent sensors, combined with the Guard software suite, operate autonomously and can make their own decisions to conduct additional high-resolution sweeps in response to detected signals. When a signal is detected the RFeye Guard system can provide a real-time alert and location to a security guard.

More about RFeye Guard
In building RFeye Guard geolocation

RFeye Guard alert screen

Threats

Video surveillance

Small camera bug

Data exfiltration

Data threat

Audio surveillance

audio threat

Applications

Embassies and diplomatic buildings

In a world of constantly shifting social and political landscapes, it is important that nations have safe spaces to discuss ongoing events and policy both at home and outside home borders. Safe spaces must exist without fear of bugging, interception or eavesdropping technologies. These secure spaces exist within government buildings as well as embassies and other diplomatic buildings such as diplomatic residences. These environments need a solution to ensure those spaces are continually free from transmitting devices and assure absolute freedom to discuss ongoing policy, strategy or intelligence.

Why RFeye Guard?

These buildings need to have complete assurance against eavesdropping and other cyber and electromagnetic threats. An occasional TSCM sweep does not usually provide the peace of mind required since it is easy for devices to be switched off or moved during a sweep and reactivated ahead of an important meeting. Hostile actors are then able to gain information to be used in a manner detrimental to the nation’s security or prosperity. In such a scenario the device may be long gone before the data breach is recognized, leaving investigators unable to identify the source or prevent further breaches. Either way, identifying the damage has already been done.

RFeye Guard will autonomously monitor secure government buildings 24/7. This means a surveillance device which is planted immediately before a sensitive meeting will immediately generate an alarm with a location. Not only does this allow the meeting to be secured, but cross referencing of RFeye Guard location data with CCTV or other data sources will often allow the responsible person to be identified.

The state-of-the-art software and RF specifications of RFeye Guard mean that even sophisticated devices using advanced transmission techniques designed to evade detection can be identified and located.

Critical National Infrastructure (CNI)

Infrastructure related to energy, transport, communications and public health are essential to a nation’s safety, prosperity and wellbeing and this has increasingly made them a target for both physical and cyber attacks. Critical Infrastructure Protection (CIP) measures are vital to key assets such as nuclear reactors, water treatment plants and dams.

Protection from electromagnetic threats needs to fit seamlessly into the infrastructure environment alongside physical and cyber measures to ensure that operation is both smooth and secure.

Why RFeye Guard?

The essential services provided by national infrastructure such as power plants, chemical facilities and drug manufacturing facilities need an extremely high level of security. Cyber and electromagnetic intrusion into such a facility can be one of the easiest ways to cause massive economic damage or even large-scale loss of life.

Using a covert device to gain remote access to the network infrastructure of a drug manufacturing facility, the industrial automation systems can be controlled to dangerously alter dosages. A data exfiltration attack on a nuclear power plant can be used to find out when nuclear materials are due to be moved and the security protocols in place. By definition, any attack on Critical National Infrastructure is likely to be disastrous.

RFeye Guard is a key component of protection for the Cyber and Electromagnetic environment in and around these facilities. The system will monitor the RF spectrum in real time allowing potential threats to be located, removed and investigated.

However, these kind of attacks designed to do immediate damage are not the only threats that CNI facilities face. RFeye Guard can also be used to prevent the use of eavesdropping devices related to industrial espionage as well as accidental RF interference to industrial automation systems.

Secure offices

Companies win commercial business through their employees ability to talk, develop, design and plan. From board rooms to engineering labs, critical tactical and strategic decisions are made and discussed in great detail. This is why, in modern business, security has to be a key area of focus. We are all familiar with the need for network security to keep intrusions out, which is perhaps why so many security breaches take place inside the organization.

Why RFeye Guard?

With IP crime related to theft of trade secrets costing the US economy alone $180 billion a year, there is a growing need for organizations to protect themselves against state-sponsored and competitor-instigated industrial espionage.

In a busy work environment, the traditional method of carrying out TSCM sweeps on a periodic basis is not feasible. The level of activity around the office means that a sweep is only really valid for the time it takes place. It is far too easy for an employee to re-activate an electronic surveillance or data exfiltration device after the sweep team has left or indeed for the evening cleaners to place devices on the request of a competitor or foreign government. TSCM sweeps are also highly disruptive to work and will usually require equipment to be switched off.

RFeye Guard monitors a facility 24/7 and in real time to detect RF transmissions which may compromise office security. This system works autonomously in the background with an alert and location provided to security guards if/when a suspect device is detected. The system can be integrated with 3rd party security systems to provide an overall security picture. Often, this will allow RFeye Guard location data to be cross referenced with other sources such as CCTV to identify employees responsible for placing covert devices.

Pharmaceutical / Medical

Cyber IP theft is a growing threat with the pharmaceuticals and biotech industries some of the hardest hit. Estimating the cost of IP theft is notoriously difficult, since the financial impact relates not only to the immediate loss of sales, but also factors such as brand reputation and willingness to invest in R&D. With increasing awareness of the need to protect IP from external cyber attacks, it is important to make sure that innovative companies are also looking closer to home. This means ensuring the office environment itself is not compromised by transmitting devices which might make a sophisticated cyber attack unnecessary.

Why RFeye Guard?

Protecting Intellectual Property Rights (IPRs) from legal challenges as well as the threat of theft is vital to the success of innovative pharma and biotech companies. Without confidence that innovation will be rewarded, investment into drug research which may go on to save thousands of lives will not be feasible. The importance of legal protection in the form of patents and Non-Disclosure Agreements is well recognized. However, all this effort is at risk of being wasted if a hostile transmitting device has already allowed a rival to steal confidential information and file a patent many months before.

RFeye Guard will continuously monitor the RF environment in and around sensitive research facilities to detect devices which may be used to exfiltrate company confidential information. This might be in the form of compromise of data stored in company servers or video/audio surveillance of meeting rooms. The monitoring takes place autonomously in the background without any disruption to day-to-day activities.

Without RFeye Guard, many pharmaceutical and biotech companies would only discover such a data loss when the rival’s patent is published. With RFeye Guard, the threat can be detected, located and removed before any compromise has taken place. In this industry, it’s not just the survival of the company itself that may be affected, but the survival of those who would benefit from future innovative drugs.

Banking and financial institutions

Banks and other financial institutions are entrusted with a vast amount of consumer and business money and data. In the event of a security breach, the consequences for the affected institution will be loss of reputation and custom in the best case. In the worst case, there could be financial liability into millions of dollars. Even where data breaches are not related to negligent or malicious activities by employees, the organization can still be found liable if regulatory authorities find that best efforts have not been made to protect data. Comprehensive cyber, electromagnetic and physical security measures are essential to minimize risk.

Why RFeye Guard?

Banks and financial institutions need a level of cyber and electromagnetic security that cannot be guaranteed by an occasional TSCM sweep. It is far too easy for a data exfiltration device to be placed or reactivated after a TSCM team has given the all clear and left.

RFeye Guard provides institutions with the 100% assurance they need enabling them to protect data, money and services to the extent their customers expect. The autonomy of the system makes it an easy way to increase security. Once a network of sensors (Nodes) is installed in a building, the system will monitor the RF space 24/7 providing an alert and location to security guards when a suspect device is detected. It can be readily integrated with other 3rd party security systems to form part of an overall security picture.

Guard can also be used to enforce mobile device bans on trading floors. Monitoring of all communications on trading floors is key in the prevention of misconduct such as insider trading. Since this monitoring can be circumvented if traders use their own mobile devices, some banks have begun to implement mobile bans. Employees are not always cooperative with such bans, either due to malicious activity or personal reluctance to be away from their phone. RFeye Guard will seamlessly detect mobile devices and their location in an office without the need to have intensive security measures such as searches and visually monitoring the trading floor.

Data centers

Data center operators trade in trust. The ability to maintain services and assure data continuity alongside security is essential. Owner operated data centers need to deliver the same level of service, and also consider security as a primary function. Internal data services are more likely to be used for IP or business critical data and processing. Reliance on centralized infrastructure is growing as cloud services and virtual desktops becomes the default computing medium, making security and continuity increasingly dependent on data center resilience.

Why RFeye Guard?

Security breaches in data centers can have massive and far reaching impact on data security and service provision. For this reason, they can have some of the strongest physical and cyber security measures in the world.

One of the easiest ways to prevent security breaches or even accidents such as staff tripping over and pulling out a cable, is to restrict human access to the bare minimum. This usually means invasive TSCM sweeps are not an option. A system like RFeye Guard can be installed in a data center and left to operate autonomously reporting back unusual RF activity to a remote security guard. Unusual RF activity may just be a malfunctioning component or could be a suspect transmission used for data exfiltration. Either way a signal location can be provided allowing further investigation.

The real-time autonomous monitoring of RFeye Guard provides an extra layer of security without introducing any new risk related to human access to the facility.

Get in touch

Speak to our application specialist

Get in touch

Counter surveillance applications

Information Security

Preventing Intellectual Property (IP) theft and keeping sensitive data secret

Keeping data centers secure

Detect unauthorized RF transmissions around data centers

This website uses cookies and third party services to deliver a seamless user experience Settings Ok

Cookies

These help us understand our visitors to improve navigation and overall site quality.

Third Party Technologies

Used to help deliver the best user experience possible