Versus Security, Inc.

  • Home
  • Versus Security, Inc.

Versus Security, Inc. Versus Security, Inc. Greg Wilson, Versus Security, Inc. Versus bonds these attributes with an unparalleled level of trust, fidelity and discreet engagement.

uses specialized equipment to sweep offices, boardrooms, hotel rooms, and other facilities where privacy is expected, to locate illicit electronic devices that hear, see, transmit or record what is occurring. operator, has 20 years experience in federal law enforcement directly related to court ordered technical compromise and installation. Greg began Versus to fill an important and usually unaddr

essed niche in the corporate, governmental and personal security space called technical surveillance countermeasures, or "bug sweeps". Versus fills the gap in your corporate physical security posture by bringing a blend of education/certification, training, equipment and most importantly, work/life experience to the hunt for illicit surveillance in your business or home. Versus delivers the response you demand for corporate office suites, home office, VIP, off-site symposiums, and other business locations.

Eavesdropping - the old fashioned way.https://reiusa.net/2019/04/queen-elizabeths-spy-master/
29/04/2019

Eavesdropping - the old fashioned way.

https://reiusa.net/2019/04/queen-elizabeths-spy-master/

The Stage England’s Queen Elizabeth I, daughter to Henry VIII, became England’s ruler in 1558. One of her first acts as queen was the establishment of an English Protestant church, of which she was made Supreme Governor. During her reign, tension was high between Protestants and Catholics and Qu...

AC to DC power supplies; USB cables; Cat 5 cables; the list of possible electronic compromise "hosts" is long.https://re...
29/04/2019

AC to DC power supplies; USB cables; Cat 5 cables; the list of possible electronic compromise "hosts" is long.
https://reiusa.net/2019/04/usb-cables-can-hide-a-new-payload-threat/

In previous articles, we discussed how lines sometimes blur between cyber security and TSCM, where skills from both disciplines may be needed to identify threats. Here’s a recent example that illustrates this, where transmitters and receivers can be used to initiate a cyber attack. There are USB c...

Great article regarding the "cost" of not taking action to defend against those who would invade your private business o...
09/02/2019

Great article regarding the "cost" of not taking action to defend against those who would invade your private business or personal space with malicious intentions.

February 9, 2019: Red Five posted an article on LinkedIn

15/01/2019

The FBI makes public its findings on China's quest to undermine U.S. leadership in global economics. Their playbook is, "rob, replicate and replace" and their tactics are found every time a rock is turned over.

Is a logical, on-going, electronic counter-measures effort part of your corporate security program? Read more here and contact us immediately: www.versusinc.net

FBI estimates corporate espionage costs businesses billions each year.
15/01/2019

FBI estimates corporate espionage costs businesses billions each year.

The race to bring viable foldable display technology to market has apparently become so intense that some of the players are resorting to corporate espionage. Prosecutors in South Korea have indict…

The 3rd & 4th paragraphs say it all. Intellectual property theft is no longer unusual in nature, small in scope, nor inf...
18/11/2018

The 3rd & 4th paragraphs say it all. Intellectual property theft is no longer unusual in nature, small in scope, nor infrequent in occurrence.

http://www.latimes.com/politics/la-na-pol-china-economic-espionage-20181116-story.html

It was the great microchip heist — a stunning Chinese-backed effort that pilfered $8.75 billion in secret American technology. But the real secret is it wasn't unusual. After a lull under President Obama, Chinese economic espionage is soaring again as U.S. relations with Beijing worsen.

I've received two offers in the last 3 weeks from corporations based out of China. An "accounts receivables manager" and...
01/11/2018

I've received two offers in the last 3 weeks from corporations based out of China. An "accounts receivables manager" and "shipping manager" were the titles of the job postings and the recruiters were very aggressive with follow-up. My solicitations came via LinkedIn.

They want to get their hands on how your business is successful, how it operates, "ponies" or "go-bys", addresses, private office communications, technological breakthroughs, pending mergers, litigation, union or employee negotiations, etc. They are relentless and are simply flooding the world marketplace with spies whose mission is to steal your intellectual property.

Fight back.

Now is the time to augment your corporate security by instituting an electronic countermeasure program. Take the steps necessary in today's electronic data transmission and storage arena that help ensure your privacy and continued corporate success.

For instance, your telephone is built with at least one microphone and usually two. The bad guys work is partially done for them! The handset does not need to be off the cradle to pass the audio from your office. It simply needs a very small software "bug", or a software change at the telephone switch.

Versus utilizes sophisticated telephone line analyzers that are capable of quickly mapping the electronic characteristics of your telephone system. Two tests accomplished from the desk phone will quickly determine if (a) there are any faults or additional attachments to your cable (wire taps) and where the fault is located; and, (b) are there electronics attached the line between your phone and the phone switch.

Versus, Inc assesses your vulnerabilities, provides strategies to mitigate intrusions, and brings the best industry equipment, training, and experience to the fight. Discreet, tenacious, trustworthy.

Call or contact us through our web page:
443-577-4746; or www.versusinc.net

https://www.wired.com/story/china-spy-recruitment-us/

Cases of Americans allegedly recruited to spy on China’s behalf follow a basic pattern.

Cruise companies, AirBnB, retail dressing rooms, school bathrooms/locker rooms, and more, have been documented targets f...
29/10/2018

Cruise companies, AirBnB, retail dressing rooms, school bathrooms/locker rooms, and more, have been documented targets for illicit eavesdropping...

If your company clientele depends on you to ensure their privacy, in your facility, especially if there is frequent, regular turnover, you should consider taking action. See our web page at www.versusinc.net

https://www.usatoday.com/story/travel/news/2018/10/28/travelers-found-hidden-camera-their-carnival-cruise-bedroom/1800150002/

A Florida couple discovered a recording device hidden among TV wires in their stateroom last October on a Carnival Fantasy cruise to the Caribbean.

The attack on intellectual property rights is never ending. Aside from the actual "target", ie: a patent, a device, merg...
22/09/2018

The attack on intellectual property rights is never ending. Aside from the actual "target", ie: a patent, a device, merger details, union negotiation strategy; business competitors & foreign entities are after your day to day business operation templates. If your company is successful, other companies want your recipe for success - the everyday little things that we take for granted. Is your company successfully combating the threat of electronic surveillance?
www.versusinc.net
https://www.wral.com/espionage/17834051/

The Triangle is a high tech hub that is home to highly regarded research universities that include North Carolina State University, the University of North Carolina and Duke University.

Public corruption isn't just for the young - this guy clicked off quite a few violations. Not the least were the illegal...
26/07/2018

Public corruption isn't just for the young - this guy clicked off quite a few violations. Not the least were the illegally hidden cameras and microphones.

https://philadelphia.cbslocal.com/2018/07/20/upland-borough-councilman-edward-mitchell-kickbacks/

If you fear your personal residence or corporate office is bugged, visit our website and contact us: www.versusinc.net

Altogether, Mitchell was convicted of six counts of theft by deception, 12 counts of criminal conspiracy, 18 counts of bribery and six counts of restricted activities.

Your Opponent is listening.....When meetings are taking place between stakeholders involved in negotiations that matter,...
10/07/2018

Your Opponent is listening.....When meetings are taking place between stakeholders involved in negotiations that matter, hire a professional to inspect the meeting venue and your "go-to" private space where your team expects to discuss the negotiations. In this day and age one should expect the team on the other side of the negotiating table to use every means available to gain an edge. Non-consensual electronic surveillance is unlawful but rarely caught or even reported because of the embarrassment and exposure it will bring to the company that is compromised.
Consider taking action to alleviate the threat - contact Versus, Inc. to discuss your options.

www.versusin.net

https://www.theguardian.com/australia-news/2018/jul/06/us-diplomat-bugged-by-australia-attacks-prosecution-of-spy-witness-k

Peter Galbraith says the prosecution of Australian spy and solicitor Bernard Collaery is ‘pointless’

To defend against insider and external threats to your company's ability to compete, you should maintain an on-going, mu...
23/06/2018

To defend against insider and external threats to your company's ability to compete, you should maintain an on-going, multi-pronged and multi-vectored security posture. Various components of your plan should be reactionary and based on today's best intel and past success; some components should be forward looking and asymmetric in relation to what you "know". Constantly striving to uncover what you don't know, the vulnerabilities you are not yet aware of, is key to your defense against corporate espionage and the theft of your company's intellectual property.

News and security tips about: eavesdropping, espionage, bugging, spying, TSCM, surveillance, spy cameras, video voyeurism, privacy, and spy gadgets.

How do you know a competitor isn't monitoring your private conversations, telephone calls, who you meet with, etc? Would...
06/06/2018

How do you know a competitor isn't monitoring your private conversations, telephone calls, who you meet with, etc? Would you lose clients if they found out your conversations were recorded by a third party?

Versus, Inc. can help you. www.versusinc.net

http://www.cbc.ca/news/canada/toronto/auto-insurer-s-secret-cameras-in-sting-operation-broke-law-body-shop-claims-1.4674774

Can insurance companies like Aviva secretly plant cameras in a private business in the hope of catching it doing something wrong? That’s the question an Ontario court will address next month.

Business disruption, anxiety, revenue loss, embarrassment, and a host of other life shattering events.Sleep better knowi...
06/05/2018

Business disruption, anxiety, revenue loss, embarrassment, and a host of other life shattering events.

Sleep better knowing you are addressing your privacy at work and at home.

www.versusinc.net

The mean cost of an insider threat is $8.7 million, according to a recent global study, and data breaches involving negligent employees or contractors can cost organizations as much as $26 million.

Hmmm...who would have guessed?https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html
27/04/2018

Hmmm...who would have guessed?

https://www.yahoo.com/news/amazon-alexa-bug-let-hackers-104609600.html

Amazon's Echo speakers featured a bug that meant the speaker continued to listen to its surroundings. Security researchers found way to make the device continue listening long after it should have switched off. Amazon said this would not allow the recordings to be passed to hackers, but would have

Schools, elementary through college, are being targeted by predators as easy "hits".  Don't let it happen in your commun...
28/03/2018

Schools, elementary through college, are being targeted by predators as easy "hits". Don't let it happen in your community. Is your child's place of learning being inspected by a qualified and independent team? So many times in life we expect that someone is surely addressing a given issue.

Illicit audio and video surveillance is illegal. Versus has the equipment and expertise to combat this threat. Contact Versus at [email protected] or www.versusinc.net to learn how your community can take action.

http://www.espn.com/college-football/story/_/id/22897052

Georgia fires assistant equipment manager James Kevin Purvis following his arrest on felony eavesdropping and drug charges.

www.providencejournal.com/news/20180308/when-rhode-island-spouses-become-spiesTake a look at the "gadgets" on his desk -...
20/03/2018

www.providencejournal.com/news/20180308/when-rhode-island-spouses-become-spies

Take a look at the "gadgets" on his desk - all of us use these items everyday. Or have them laying around our office work space, home work areas, etc. These illicit eavesdropping devices will wreak havoc in both your work and personal life.

Contact Versus, Inc. today and schedule an independent sweep of the places in your life where privacy matters. Just click on one of the pictures below, or, email us at [email protected]

22/02/2018

What is the value of your ideas, strategies, your innovations, new technologies and new ways of doing business? What would be the cost should they be compromised?

Do you wonder if illicit eavesdropping may be affecting or compromising your company's future?

If so, read, "The Economic Value of Intellectual Property" which I've linked below. You will be enlightened by the statistics and concepts. Published in 2005, it is a comprehensive look at the value of your business ideas, methodologies, and other intangible assets.

The introduction alone is worth your time. It clarifies why it is important for you to take rational measures to protect your companies intellectual property.

Contact Versus, Inc. ([email protected]) to discuss how adapting technical surveillance countermeasures to your overall security plan will benefit your company.

http://www.sonecon.com/docs/studies/IntellectualPropertyReport-October2005.pdf

12/02/2018

This video demonstrates the potent capability of video surveillance coupled with the ability to analyze and instantaneously communicate findings through AI.
Imagine your competitor has a concealed camera and microphone in your office, on your phone, or in your conference room... they know who you meet with, when you meet, and the content of your discussions.

Is it time you spoke with an independent professional dedicated to ensuring your success isn't compromised by illicit audio and video surveillance. That's what we do at Versus.

Send an email now to begin the discussion.

This article does not go into detail about the incident but is another example of "electronic spying" in the places we m...
02/02/2018

This article does not go into detail about the incident but is another example of "electronic spying" in the places we most trust.

The penalties are fairly weak for the perpetrators compared to the potential value of the "take". The damage wrought to the victim company and individual customers and clients can be devastating both in business and their personal lives.

Email Versus and begin a discussion about defending your business and customers from illicit electronic eavesdropping.

http://www.wktv.com/content/news/Bassett-Medical-Center-nurse-accused-of-video-recording-employees-471137273.html

A nurse with Bassett Medical Center is facing felony charges after he allegedly installed surveillance equipment in an employee-only area of the hospital to record his co-workers.

I've attached an informative (and a pretty dry) report pertaining to data breaches entitled, "The Impact of a Security B...
01/02/2018

I've attached an informative (and a pretty dry) report pertaining to data breaches entitled, "The Impact of a Security Breach 2017". While Versus focuses on audio and video data exfiltration and compromise, the fundamental question is answered in this article, "What is the cost of a security breach to my company?" The pie charts from respondents in the report are included below.

In the end, a data breach is costly regardless of how the data is obtained.

https://www.guidancesoftware.com/docs/default-source/document-library/publication/dark-reading-report-the-impact-of-a-security-breach-2017.pdf?sfvrsn=f08e69a2_6

Versus uses an array of sophisticated equipment to assist in locating surveillance equipment during an inspection. If yo...
23/01/2018

Versus uses an array of sophisticated equipment to assist in locating surveillance equipment during an inspection. If you believe your privacy has been compromised by an illicit electronic device designed to record or transmit audio and/or video, email or call Versus today.
https://news.sky.com/story/surveillance-devices-hidden-in-everyday-items-11189005

Recording equipment can now be perfectly disguised in fire alarms and adapters - causing demand for bug-sweeping services to soar.

Electronic surveillance permeates every facet of our lives.  It is only a matter of what a willing adversary, or disgrun...
03/01/2018

Electronic surveillance permeates every facet of our lives. It is only a matter of what a willing adversary, or disgruntled employee, or state actor, is willing to invest in time and money to egress the intelligence.
The article below demonstrates what competitors are willing to do because the return on their investment is so effective, it is worth the effort.
https://www.forbes.com/sites/bizcarson/2017/12/15/jacobs-letter-uber-spy-tactics/

A 37-page list of complaints from a former Uber employee has exposed some of the company's secret tactics.

This is a good rundown of the steps you can do that will provide some defense against illicit surveillance.  It's a good...
03/01/2018

This is a good rundown of the steps you can do that will provide some defense against illicit surveillance. It's a good start and good information overall, especially if taken in the context that some defense is better than none. For expert consultation, survey, inspection and analysis, contact Greg Wilson at Versus, Inc. to get the ball rolling on what you can do to protect yourself.

https://www.wired.com/story/how-to-sweep-for-bugs/

To keep them from listening in, take a very good look around you. And then bust out the tools.

This is a trend now and you should be aware that it could happen to you. Using unsecured internet access points at hotel...
05/12/2017

This is a trend now and you should be aware that it could happen to you. Using unsecured internet access points at hotels are no less potent and can present a significant vulnerability in your professional and personal life.

Most corporate and business surveillance is undertaken by serious minded people, using professional level equipment and connections. Are you and your staff equipped to identify where vulnerabilities exist and address them? Do not wait until the emergency strikes, be proactive in safeguarding your privacy.

Technical surveys, assessments and inspections are what Versus does. We work on a personal level with security chiefs, CEOs, VIPs, and others to ensure that they are aware of the challenges and the methods to mitigate the vulnerabilities they face.

Call or email Versus today to talk about what we can bring to the fight against those that seek to invade your private space in your business and personal life.

https://nypost.com/2017/12/04/people-keep-finding-hidden-cameras-in-their-airbnbs/

Airbnb has a scary problem on their hands: People keep finding hidden cameras in their rental homes. Another host was busted last month trying to film guests without their knowledge — marking…

Another example of the connected world we are living in. Everyone is vulnerable in almost every facet of their lives.Wha...
03/12/2017

Another example of the connected world we are living in.
Everyone is vulnerable in almost every facet of their lives.

What steps are you taking to ensure that your company's strategic efforts are not being undermined by the recording or transmission of data that you hold secret or classified?

Click on the Send Email link above to begin resolving your security vulnerabilities and hazards.

https://techcrunch.com/2017/11/20/germany-bans-kids-smartwatches-that-can-be-used-for-eavesdropping/?lipi=urn%3Ali%3Apage%3Ad_flagship3_company_admin%3Bhb674UdsT%2BSBfFG4mFEKGA%3D%3D

A German regulator has banned domestic sales of children's smartwatches that have a listening function -- warning that parents have been using the devices to..

Address


Alerts

Be the first to know and let us send you an email when Versus Security, Inc. posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Versus Security, Inc.:

Videos

Shortcuts

  • Address
  • Alerts
  • Contact The Business
  • Videos
  • Claim ownership or report listing
  • Want your business to be the top-listed Travel Agency?

Share