t this presentation I will give you some examples what kind of manipulations
and wiretapping methods exist. Furthermore I'll demonstrate you some examples
what devices we had found. Finally I?ll give you some advices how you get
enabled to detect bugging devices and protect yourself from those.
Speaker
I work for a security company. Major goal is to protect our clients against
industrial and economic espionage. A significant part of our work is to "sweep"
or to set up a bug-proof room, equipment or environments.