How soon can the intruder be detected?
The answer is uncertain. The intruder’s handiwork will be detected first. The first priority is to eliminate the threat to your privacy and security and prevent future threats. Electronic Counter Measures LLC will collect all available evidence as part of our detection and preventive countermeasures. Your privacy and security will be restored; however, identifying who planted listening devices or who was listening may not always be possible. It all depends on the evidence. The quality of the evidence can often depend on how sophisticated or, alternatively, how careless, the intruder turns out to have been. Determining who was intercepting your private, sensitive, or classified data or communications is often a question of identifying potential parties with reason to want access to this information. We will help you do that. This is a standard part of our vulnerability and threat assessment procedures. Once we have detected phone-tapping / surveillance activity and/or devices, and colle