Covert security technologies are only detectable with the use of sophisticated devices.