EasyManua.ls Logo

OSCOR OSC 5000 - Scheduling a Sweep; Time of Sweep; Environment Setup; Understanding Threat Type

OSCOR OSC 5000
121 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
SECTION 6: CONDUCTING A SWEEP
REI OSC-5000E 92
The sweep is performed after hours, but the eavesdropping equipment is activated
only during business hours.
The sweep equipment is the wrong equipment or is not used properly. There are
many bug detectors on the market that are merely toys with lights and knobs, and
not all expensive equipment will necessarily meet your specific needs.
The sweep team is careless or poorly trained.
A sweep is conducted prior to a meeting, but someone wears a body bug or tape
recorder into the meeting.
Scheduling a Sweep
Do not discuss the sweep on any phone or within the building of the target environment.
As few people as necessary should be notified of an upcoming sweep. When scheduling
a professional sweep, the contractor should be contacted using phones outside the target
area. It is very important to understand the qualifications, capabilities, and limitations of
the contracted personnel.
Time of Sweep
If possible, the sweep should be conducted during business hours in conference rooms
and corporate offices when bugs are more likely to be active. For offices and rooms that
are accessible to all employees, it is recommended that the sweep be conducted in the
evenings or on weekends. A sweep should be performed as soon as possible after the
sweep team has been contacted, in order to minimize the possibility of personnel finding
out about the planned sweep.
Environment Setup
Since some devices may be controlled remotely, conducting a fictitious yet plausible
meeting can prompt the eavesdropper to activate all devices. If the meeting is advertised
as very important with outside executives attending, the eavesdropper may even heighten
the level of surveillance. All office equipment (coffeepots, computers, lights, copiers, fax,
etc.) should be turned on to activate any potential bugs. If the sweep will occur during
normal working hours, the sweep personnel should be dressed as typical employees or
business colleagues. The sweep equipment is more effective if it is easily transported and
disguised.
Understanding Threat Type
Beforehand, try to determine if the threat is internal or external. An internal threat is more
common but tends to be less sophisticated. An external threat typically relies on inside
help in planting devices and stealing company information. Also, try to discover the
purpose of the threat and the cost of confidential information. Understanding the type of
threat can provide additional insight into the type and sophistication of the surveillance
devices.

Table of Contents