Countermeasures and Kelmar
The use of intrusion devices to obtain sensitive information is typically illegal and can cost companies' untold damage to their reputation as well as monetary loss. To prevent this liability, an aggressive security and countermeasures program should be implemented. In addition to the initial analysis, quarterly or periodic follow-up evaluations should be conducted. Our clients include government agencies, corporate and private businesses and individuals. Kelmar Group have evaluated multiple story buildings, warehouses, offices and related construction areas. The following is a guideline of services offered by Kelmar Group:
Evaluation Process: The type of intrusion device(s) utilized is usually directly proportionate to the client's level of threat. During the initial evaluation by Kelmar Group, questions will be asked to determine the nature of the client's business, current risk factors such as pending litigation or new products or patents being considered, competition issues and other questions that will help identify the level of the threat.
Pre-Sweep: Technicians will conduct pre-sweep evaluations of the general area, exterior and perimeter for unusual equipment or individuals. The telephone company's junction/bridge equipment will be evaluated as well as the client's property.
Sweep Summary: A team of technicians will conduct the evaluation utilizing technical equipment and expertise of the technicians. Each room will be analyzed for recording devices, microphones and related intrusion devices. The technicians will also review each telephone set individually, as well as each telephone line. Wall outlets will be inspected for illicit transmitters ("hoppers") carrying communication signals. All wiring will be inspected as well as the walls, floors and ceilings. Technicians will deploy ultra-violet markings on key equipment and telephones to assist in identifying tampering in follow-up investigations.
Secondary Review: While conducting the primary evaluation, technicians will make additional notations of other security issues such as open and unlocked office doors; computers left on or unprotected by passwords, lack of paper shredders, and related security issues. These items will be brought to the client's attention upon conclusion of the evaluation.
What if Something is Found? Locating the method of intrusion is only one part of a true countermeasures investigation. Should a device(s) be located, technicians will photograph and document the presence of the device and initiate a chain of custody element. Through consideration with the client, a plan of action will be implemented for further documenting those responsible for the intrusion.
What if Nothing is Found? The lack of findings may indicate other elements of intrusion such as the client's trash being absconded, disgruntled employees, air ventilation systems inadvertently used to listen to conversations and a host of other possibilities. Should this be the case, technicians will assist the client in identifying these situations.
*If considering hiring a countermeasures expert, DO NOT contact the agency using a telephone or computer that may be compromised!