Excerpted from an article by Alan Earl, BJ
What if a TSCM sweep conducted the night prior to the client’s important meeting detected no suspicious transmissions and the real time monitoring also indicated no suspect communications? Does that mean no eavesdropping took place?
Not necessarily….Audio and or video data could have been recorded and scheduled to be transmitted at a later date. This eavesdropping technique is often termed as Store and Forward Bugging.
Children and computer enthusiasts around the world have in recent years embraced the Raspberry Pi as a platform to learn coding and build IoT devices. For less than $100...
In a scenario where the Raspberry Pi with camera and or microphone was hidden within a board room and the mobile phone as a tethered WiFi AP in a nearby room or even outside the building, both powered with a power pack or mains AC, an extremely powerful and possibly challenging to locate (from an RF perspective) store and forward bug could easily eavesdrop on sensitive information.
...contemporary bugging devices and techniques require contemporary TSCM methodologies to counter that threat, utilizing modern technology to detect and locate them; eavesdropping techniques have evolved as technology has. more