The eavesdropping of confidential conversations in conferences, meetings, corporate offices and private homes poses a significant threat to companies and governmental organizations; the potential damage that can result from the disclosure of research or negotiation results can threaten the existence of companies.

Experience shows that a ban on mobile phones for meetings and negotiations is not an obstacle to recording and passing on information.

Small transmitters can be hidden almost everywhere and the transmission ranges are almost unlimited:

+ Transmitters disguised in a power outlet, electricity meter, lamp, light switch, computer mouse, pen, calculator, USB sticks, etc.

+ Bugging devices directly worn on the body

+ directional microphones, laser IR direction finder systems or microphones mounted on windows & facades

In principle, a distinction must be made between two groups of perpetrators with regard to concealed eavesdropping devices: External perpetrators, e.g. visitors, business partners, service providers, couriers, etc. External perpetrators can be effectively prevented from smuggling in bugging devices by establishing an effective counter-surveillance, monitoring and access control.

Internal perpetrators, e.g. employees, maintenance technicians, cleaning staff, etc. Internal perpetrators are usually not subject to extensive access control procedures and can therefore deposit and install bugging devices much more easily.

Unfortunately, many companies and authorities handle sensitive information too lightly. Without special equipment, no effective protection against foreign intelligence services can be guaranteed, as they have professional eavesdropping devices and technology to carry out targeted and industrial espionage. Furthermore, many institutions only act after the occurrence of a damaging event – a foresighted and comprehensive eavesdropping defense planning is therefore essential in order to avoid greater damage.

Stakeholders‘ conferences are a preferred target of eavesdropping actions


unival group | Access security measures
1 | Making important rooms and buildings tap-proof. This is guaranteed by various active and passive countermeasures.
unival group | Access security measures
2 | By concealed and efficient screening of persons by different active and passive security systems the smuggling in of listening and recording devices is prevented.
unival group | Active counter-monitoring from the control room
3 | The entire area is continuously monitored actively by the security room through intelligent video analysis and frequency detection, in order to prevent the concealed installation of listening devices even outside company opening hours. Furthermore, during conversations the room is actively monitored by unival systems for suspicious transmission signals, which are directly detected, analyzed and jammed.

unival has been carrying out professional eavesdropping protection measures for private and governmental clients for more than 10 years.

In addition to active “debugging”, we offer comprehensive, multi-level and individually adapted eavesdropping defense concepts, which are guaranteed by state-of-the-art and redundant eavesdropping defense technologies.

Furthermore, we accompany our customers from the planning of the eavesdropping defense measures via the integration up to the threat awareness training.

Through years of experience and optimization we offer for the first time a comprehensive tap-proof protection concept, which is freely scalable from the individual conference room up to complete buildings.

Find out more about our solutions: