Electronic Surveillance

When most people think about electronic surveillance, they think of spies, James Bond and the secretive gathering of intelligence. Electronic surveillance also takes on other forms, such as a private detective surveilling a cheating partner. A company might surveil employees at work using hidden cameras and microphones to uncover acts of misappropriation or the unauthorized use of equipment and resources. Electronic surveillance regarding these activities is not illegal, although many individuals consider surveillance a violation of personal privacy.

Observing or listening to persons, places, or activities—usually in a secretive or unobtrusive manner—with the aid of electronic devices such as cameras, microphones, tape recorders, or wiretaps. The objective of electronic surveillance, when used in law enforcement is to gather evidence of a crime or to accumulate intelligence about suspected criminal activity. Corporations use electronic surveillance to maintain the security of their buildings and grounds or to gather information about competitors.

Electronic surveillance permeates almost every aspect of life worldwide. In the public sector, , judiciary, military, and law enforcement all use some form of this technology. In the private sector, business competitors, convenience stores, shopping centres, apartment buildings, parking facilities, hospitals, banks, employers, and spouses have employed various methods of electronic eavesdropping. Litigation has even arisen from covert surveillance of restrooms.

Three types of electronic surveillance are most prevalent: wiretapping, bugging and videotaping. Wiretapping intercepts telephone calls and telegraph messages by physically penetrating the wire circuitry. Someone must actually “tap” into telephone or telegraph wires to accomplish this type of surveillance. Bugging is accomplished without the aid of telephone wires, usually by placing a small microphone or other listening devices in one location to transmit conversations to a nearby receiver and recorder. Video surveillance is performed by conspicuous or hidden cameras that transmit and record visual images that may be watched simultaneously or reviewed later on tape.

Electronic eavesdropping serves several purposes:

  1. Enhancement of security for persons and property
  2. Detection and prevention of criminal, wrongful, or impermissible activity
  3. Interception, protection, or appropriation of valuable, useful, scandalous, embarrassing, and discrediting information

The law attempts to strike a balance between the need for electronic surveillance and the privacy interests of those affected.

Hidden Camera Detection

However, the selling and buying of hidden cameras are completely legal, but there are many laws that you have to follow. The use of hidden cameras is considered legal or illegal based on the location or area in which you record or live.

Usually, there is no problem with the use of hidden security cameras at your private property, such as a garden, garage, or home. But if you use hidden cameras in public areas or places, it can lead to legal issues. Some offices and workplaces sometimes may record employees without their permission based on the situation.

The legality may be applied to hostels, rental places, guest rooms, etc. The situation gets more complicated when the suspects of the recorded subject are hotel employees.

There are numerous cases in which people are found to violate privacy laws. In many cases, hidden cameras are found at locations and places where people expect some levels of privacy or private space.

Cellphone Forensics

The growing reliance on cellular phones, particularly smart phones has presented a new frontier for investigators who have become trained in cellular forensics including recovering deleted text messages, past GPS locations and other data that may have been deleted.

Various applications are available to download to a smart phone making them easy targets for bugging.  An application can turn your phone into a GPS tracker as well as sending out all of your text messages, surfing history as well as your own cell phone conversations. These programs and more can be identified easily with our special cellular forensic software.

SDS Investigators offers professional services to not only undelete data from your smart phone, but also check it for spyware that may be watching and listening to your every move. You will need your unlock code from the phone in order for us to perform this service to keep the price economical. Password bypassing is possible at an added cost.

Computer Forensics

Computer technology keeps advancing and we are now faced with new and complex issues that affect our business and personal life. Individuals with bad intent use the computer as a tool of crime or deceit. SDS  technology investigators have responded by implementing tools and methods to combat these individuals. Time, Information and Material theft are common these days.

SDS Investigators computer investigations include:

  • Computer Spyware Detection and Removal
  • Hard Drive Forensic Examination
  • Keyloggers Identified
  • Undelete Deleted Computer Files
  • Cell Phone Spyware Detection and Removal
  • Cell Phone Taps and Bugs Removed
  • Fraud
  • Infidelity
  • Theft
  • Employee Dishonesty
  • Vandalism
  • Destruction of Files
  • Sabotage
  • Forensic Investigations
  • Data Mining
  • Hard Drive Cloning
  • PC Discreet Remote Monitoring

We offer a complete list of services for all of your investigative needs