Covert cameras for documenting security gaps - Directional microphones (where legally permitted) - Wi-Fi analysis tools for identifying nearby networks - Bluetooth scanners for identifying devices