Home - Magazine - Next Issue

Do your walls have ears?

It’s a scary world out there, with a threat round every corner – and not just for characters in spy movies. Rich Middleton explores the all-too-real high-tech security dangers faced by today’s wealthy individuals.

The world of bugs, phone taps and pinhole cameras hidden in picture frames may seem the stuff of international espionage but it is actually much closer to home than you may think. Security analysts recently estimated that espionage is costing global business around $200 billion a year.

And while companies also suffer, the wealthy individual poses a very attractive proposition for criminals with easy access to the technical equipment required to reach them. Indeed, when sales estimates for bugging devices recently topped £10 million, both the security industry and the corporate world took note.

Peter Heims, author of Combatting Industrial Espionage, is not surprised: ‘I used to regularly sweep some of London’s top hotels and I often found bugs in phones in the rooms. The planters were aware that many businessmen conduct both personal and company affairs while away from home. Tapping a phone is not difficult and can allow incredible information to be accessed very quickly.’

Justin King of C2i International confirms that bugging devices are common in his line of work. His firm, which conducts thorough sweeps of premises and private households, estimates that it finds bugs in 5% of properties searched.

Bugs are not only used to gather sensitive passwords and bank details, they can also record the movements of wealthy people and their families – invariably for kidnap attempts.

King explains: ‘If you look back over the last ten, years there have been plenty of cases that demonstrate how prevalent these forms of attack are. We have definitely seen an increase in espionage involving medium-cost, internet-purchased devices over the last three years.’

Listening in
Modern bugs can be hidden within a telephone handset, wired into a wall-hanging or even hidden within mobile phone battery.

‘How many of us look at the mobile phone batteries to check that the serial number is still the same?’ asks King. ‘We are seeing more of this type of attack, effectively bugging both sides of every call made.’

Placed under a table at a restaurant, an ‘off the counter’ bug can be as much of a threat, picking up conversations within a 10ft radius. Portal, the exclusive Portuguese restaurant in London popular with businessmen, stockbrokers, celebrities and Chelsea Football Club, recently admitted to finding a bug placed in a wall socket.

Expert help
However, there are simple steps you can take to avoid being ensnared by criminals, from lowering your voice in public places and ensuring you are aware of anyone entering your home, to employing a security firm to sweep your premises and looking at effective property security solutions.

‘The first thing we usually do is to conduct a threat assessment,’ says C2i’s King. ‘From this, a threatscape is obtained and countermeasures are put in place.’ While sweeping for high-tech devices is important, he advises wealthy individuals to use common sense – especially when it comes to disposing of confidential information and employing domestic staff.

‘We routinely find that there are simple problems to be fixed first of all, such as using a good safe and a shredder, carrying out background checks on employees and holding meeting in hotels rather than at home,’ he says.

 

‘Of course, we also strongly suggest a regular series of technical surveillance countermeasures or sweeps for electronic surveillance,’ he adds. ‘This will include a physical security review and the sealing of all communication devices.’

US firm SAFE (Strategically Armored and Fortified Environments) has been employed by some of the wealthiest people on the planet to offer protection and peace of mind. Although its most comprehensive security solutions cost upwards of $1 million, the cover provided is immense. Sensitive sound and vision systems are placed across an estate to tactically detect intruders, while ballistic-grade doors, capable of blocking bullets and keeping out gas, can be incorporated to deter intruders when a property is empty.

Rest assured
A safe room, within a secure core, can provide peace of mind. SAFE’s director, Al Corbi, explains. ‘It takes seven to ten seconds to get from a break-in point to the master bedroom,’ he says. ‘There simply isn’t enough time to get your family into a safe room. However, when used in conjunction with a Safe Core, the panic room becomes an effective part of a completely secure environment.’

Modern safe cores can be installed on any floor. Hidden cameras record the criminals, while direct phone lines ensure authorities can be contacted. Built of materials such as Kevlar, the safe room is often hidden, so only a handful of people will ever know it exists.

Safes are also important, and buying one appropriate to your worth is essential. German firm Dottling offers safes ranging from $55,000 to $160,000. Within this price bracket, safes become a hybrid of incredible security and good looks. Dottling’s range offers extremely good technical protection, including fingerprint and retinal scanners, as well as comprehensive locking systems, all disguised as an antique piece of furniture.

Online crime
But it is the invisible threat from the internet which seems to cause the greatest concern. With information ranging from bank account details to records of shares held or financial securities, protection is vital. Jim Norton, senior policy adviser for e-business and e-government for the UK Institute of Directors, says the threat from Trojan viruses must be taken on board. ‘Trojans can pose a very serious threat,’ he says. ‘They can record key sequences, such as passwords, credit card numbers or bank details,’

And as the individual is often unaware of the presence of Trojan viruses, the criminal can work at his own pace. Once he has gathered information and confidential passwords, the damage can be extensive. ‘To prevent Trojans accessing your computer, use effective antivirus software, supplemented with a firewall,’ says Norton. ‘There are also intrusion protection systems that identify unusual patterns of behaviour on a computer.’

It is also important to check the communication lines themselves, says Justin King, particularly for those whose wealth could make them a target. ‘We use many computer analysers, who check modern communications such as ISDN, VoIP and ADSL as well as any wireless networks for access points,’ he says.

Vigilance is key
As with all personal security issues, vigilance is essential. Keep an eye on those entering your home and workplaces, and limit those who access your communication devices.

‘People need to be aware that they must not use foreign media without knowing what it is,’ says Norton. ‘For example, CDs were recently handed out to commuters in London and over half of the people who received the CDs put them straight into their computers. Luckily for them, the software on the CD simply sent a message back to the firm conducting the experiment, but it could easily have been a Trojan-style device. It is down to the individual to use their common sense to keep their computer systems, and their security, safe.’

Back to top
About Us - Partners - Subscribe - Advertise - Contact Us - Terms and Conditions - Privacy Policy