A.R.C. Albany Region Counter-Surveillance.

Professional T.S.C.M. Bug Sweep Services (Technical Surveillance Counter-Measures).

Serving the Albany, Schenectady & Troy Tri-Cities Area of NY & New York's Greater Capital Region .

About Our Detection Equipment.

The main counter-surveillance equipment we utilize was invented by a man named John Meyner. He is a recognized authority on the subject of counter-surveillance devices and detection methods. Mr. Meyner was called upon during The Watergate Scandal to assist the FBI with the identification of the devices used during the botched secret intelligence operation that led to the scandal. Mr. Meyner was also invited to appear on the TV program 60 Minutes to share his expertise on the subject of bugs and bug-detectors several times. John Meyner was also called upon to develop special projects for the New York City Transit Authority to help secure the Manhatten subway system. The same detection equipment we use is also in use by the following governmental; military, corporate, and civilian organizations:

  • The United Nations
  • U.S. Department of Justice
  • U.S. Naval Weapons Laboratory
  • U.S. Department of Defense
  • U.S. Department of Agriculture
  • N.A.S.A.
  • L.A. Police Department
  • Dallas Police Department
  • General Electric
  • IBM
  • Allied Chemical
  • Continental Airlines

That being said, let's look at a sampling of the kinds of devices that we are able to locate for you . Bear in mind that most of the following devices are wireless transmitting threats. We use other methods for finding the hard wired systems that avoid detection by transmitting no radio signals...

 

Hidden Room Microphones.

Our equipment capabilities cover a much wider frequency detection range - better than 99 percent of other services around the nation. If their equipment can only detect up to 5.8 gigahertz, then the search is limited to only about 30% of the potential threats. In addition, our equipment is expertly designed to pick up the latest detection-evading transmitter technologies.
  • Concealed Wall Power Plug Transmitters. These look and work like any normal plug sold in a hardware store that plugs into a wall outlet and makes one outlet into more than one so you can plug more devices in. The difference is that they are concealing a microphone with excellent pick-up and a transmitter built right in. They come in many sizes and colors and look no different from the outside. These cannot be discerned without detection equipment or disassembly and inspection.

Wall Plug Transmitter.

Functioning Wall Outlet Splitter Disguised Audio Transmitter.

  • Concealed Wall Outlet Transmitters. These are actual working wall outlets that have been modified with a microphone and transmitter similarly to the power plug type. These units are more powerful however, with a greater broadcast distance, and are also even better concealed.

Wall Outlet Transmitter.

Funtioning Wall Power Outlet Disguised Audio Transmitter.

  • Concealed Lamp Transmitters. Like those above these use the wall outlet power directly to run the microphone (or camera) and the transmitter. Since the lamps can be any shape and size and work like normal, they are very effective concealment. In the case of 'hidden in plain sight' items such as these, they can be installed in two ways. The bad guy could photograph or otherwise observe your room and match the item later with an identical bugged one, or it could be given or left as a gift. Items like these can also be clocks; radios, plants, pictures, etc.

Lamp Transmitter.

Audio Transmitters Can be Purchased Pre-Concealed Inside Innocent Looking Objects Like This Lamp.

Hidden Telephone Interception Devices.

ARC's telco analysis equipment is designed to operate on todays digital systems and phone lines and also to defeat the latest advances in technology - designed to make phone bugs undetectable.

  • Automatic Telephone Recording Devices. Often sold for legitimate business purposes to the general public, these tiny black boxes only one inch square connect your telephone wires to any recorder with an input jack and turns it on only when the phone is taken off the hook. These are very popular with non-professional eavesdroppers because of accessibility and do pose a serious threat to privacy.

Automatic Telephone Recording Device.

Telephone Line Automatic Start Device for Recorders.

  • Series Telephone Transmitters. A very stealthy kind of device in that, besides being quite small, it takes power directly from the phone line itself to operate and therefore needs no batteries. They can be connected anywhere along the telephone line and, like the wall transmitters, transmit a signal to a nearby outside location.

Series Telephone Transmitter.

Series Telephone Tap Transmitter.

  • Parallel Telephone Transmitters. Have a longer range than the Series type, but require external power to operate. That means they either need batteries or they are wired right in to the building's AC power line. These otherwise do the same thing as a Series type transmitter by connecting anywhere to your phone line and sending all your phone conversations to an outside location. Since they do not draw power from the phone line itself, these are a little harder to detect.

Parallel Telephone Transmitter.

Parallel Telephone Tap Transmitter.

  • Modular Phone Jack Plug Transmitters. Similar in idea to the wall plug transmitter, these instead capture and send all telephone conversation, rather than room sound from a microphone. They are identical in every way to any phone jack splitter plug except for what is inside, completely hidden.

MOdular Telephone Jack Transmitter.

Phone Jack Splitter Disguised Audio Transmitter.

  • Wall Outlet Phone Jack Transmitters. These also capture phone conversation directly from the phone line, but these are made to replace an actual standard telephone wall plug. There is no way to tell the difference without using detection equipment or pulling them apart.

Telephone Wall Outlet Transmitter.

Standard Telco Jack Disguised Audio Transmitter.

  • Infinity Telephone Transmitters. These devices allow the eavesdropper to call into your phone from anywhere in the world silently and transform you phone's own mouthpiece microphone into the bug itself. In this way, your own phone's sensitive microphone can be used to very effectively monitor an entire room or more while it is still on the hook. These are arguably the most dreadful telephone bugs of all. To begin with they are small. They can be hidden anywhere on the phone line - including inside the phone. Unlike other 'drop in phone reciever' type bugs, these are just as effective no matter where on your phone line they are tied-in. Infinity devices are very popular because they provide almost total guaranteed safety for an eavesdropper. The target's phone will not ring at all when the eavesdropper is turning it on and listening. There is no way to know if this bug is present without the proper detection equipment and training. We can detect these bugs even if they are not active. These devices are also called a Hook Switch Bypass, a Third Wire Tap, or a Harmonica Bug.

. Infinity Telephone Transmitter.

An Infinity Device.

  • Cell-Finity Cellular Telephone Transmitters. This modern day computer-age version of the Infinity Device is actually a piece of specialized cell phone software that can be remotely downloaded into your phone and converts your cell phone's microphone into a covert monitor. Once again it works just like a telephone infinity device, the listener can call-in from literally anywhere and activate it without your knowledge. This evil device (actually software) even works when the phone appears to be powered-off.

Cellphone Software Infinity Device.

Cell Phone - Can be Hacked With 'Cell-Finity' Softaware.

Covert Spy Cameras.

  • Concealed Spy Cameras with Transmitters. These often work on the same principals regarding how they are powered and how they are concealed as their microphone transmitter cousins. In fact many times, these cameras are working in tandem with a microphone, having one either built right in or attached with a separate wire. Laws governing video camera recording are much more lenient than those governing microphone audio recording. In fact, unless private property is actually invaded to place the cameras, the inclusion of the microphone itself is most often the very component that makes a camera set-up illegal. Because the laws are so much looser on video recording, spy cameras are far more rampant than audio transmitters. However, many spy-cams have a microphone built in them anyway or merely need only to have one plugged in to it via included audio cable jacks. There exists a massive range of cameras on the marketright now in every quality and size from low to high. Anyone can legally obtain a micro-camera already pre-hidden inside any innocent looking object. In addition, even a creative hobbyist can buy high-grade micro cameras alone and design a custom concealment, or simply hide them in the pre-existing scenery or structure of the environment they want to watch.

Body Wires.

  • Concealed Body Worn Transmitters. This array of devices involve special microphones and/or cameras that are hidden on a person. Any conversations picked-up in their immediate personal area are then transmitted to another location a safe distance away for monitoring and recording. They operate on battery power and are used for short term spying. Naturally, these can only be detected if they are actually present at the time of the search.

Body Worn Microphone Transmitter.

Body Worn Audio Transmitter.

RF Tracking Devices.

  • Bumper Beepers. These are used by a mobile surveillance team to follow and track target automobiles without being observed. These units can be used effectively at ranges of over 5 miles. They normally are attached to the vehicle with powerful magnets. The reciever is normally in a vehicle with the people who are using it to follow you at a safe distance. They get their name from the fact that they were placed inside the vehicle's bumper where even auto mechanics don't normally look without a good reason.

Bumper Beeper Tracking Device.

Bumper Beeper Tracking Transmitter.

  • GPS Global Positioning System Transmitters. Via a satellite network, the position of a vehicle is tracked from space in real time. Some systems use the cell phone towers to supplement the triangulation of the vehicles location. The spy will view the activity of the bugged vehicle from any internet connected computer. The device is hidden in the vehicle and usually is permanently wired-in to the vehicles own wiring to get power. These systems are extremely widespread and available to everyone with the money and inclination to use them. There is usually a subscription service through which the spy logs-in to a web site to view tracking data. Although we have really only looked at radio frequency or RF transmitting devices so far, it should be noted about GPS trackers that...
  • GPS Tracking Units are available which do not transmit any signals of their own. They receive signals only, but must be left behind and hidden in the target vehicle and then later retrieved in order to get the tracking data stored on them. In fact these are know as Leave and Retrieve Units. Although tracking cannot be observed in real-time, a record of all your recent travels is logged in real-time for later computer download and study. They can be left in place for one to three weeks straight without changing the batteries. They are inexpensive; very small and stealthy, widely available, and are not detected with RF detection. For these reasons they are probably more common than the transmitting type. They are only detected through careful physical examination..

GPS - Leave and Retrieve Unit

GPS Leave and Retrieve Unit. (Can only be found through a physical check.)

 

Back to A.R.C. Main Page.