ph-neutral header
welcome talks guest_info party history imprint darklab phenoelit twist4

Title

Abstract

t this presentation I will give you some examples what kind of manipulations and wiretapping methods exist. Furthermore I'll demonstrate you some examples what devices we had found. Finally I?ll give you some advices how you get enabled to detect bugging devices and protect yourself from those.

Speaker

I work for a security company. Major goal is to protect our clients against industrial and economic espionage. A significant part of our work is to "sweep" or to set up a bug-proof room, equipment or environments.