
PLANNING AND CONDUCTING A SWEEP
REI
CPM-700
32
•
Setting up the eavesdropper: Since some devices may be remote
controlled, set up a fictitious, but plausible, meeting to prompt the
eavesdropper to activate all of his devices.
•
Additional personnel: During the sweep, additional trustworthy
personnel may be needed to aid in the inspection procedure.
•
Random follow-up sweeps: Conduct follow-up sweeps at random
intervals.
•
Controlled leakages: To discover the source of “leaked”
information, allow some information, real or contrived, to be
leaked
intentionally
in a controlled way. Only you know what
information was given to whom and where, so you then can
determine the source of the leak. It may be through
eavesdropping, an inside person, un-shredded paperwork, or
other method.
•
Reverse intelligence: To use “reverse intelligence,” a sweep must
be conducted covertly. Your consultation with your colleagues or
customer, your entry into the target area, equipment setup, known
sound source, and localization of a surveillance device must not
tip off the eavesdropper if you intend to “feed” information to him
once a device is uncovered.
SWEEP TIPS
Low Security Area
This is an area used for practice and setup. This should be an area that an
eavesdropper normally would not want to monitor so your actions can be
covert.
Target Area
The target area is the location where sensitive conversations take place
(normally at a desk near the telephone). Most devices will be placed within
a twenty-foot (7 meter) radius for good audio and/or visual reception.
Be sure you are familiar with the operation of the CPM-700 and the
various detection methods before you begin a sweep. Practice detection
and location procedures with this product in a low security area prior to
performing an actual sweep.