Bug sweep and TSCM
We will help you eliminate any potential threats. If someone is listening in, we will find out and secure the evidence.
Bug sweep or Technical Surveillance Counter Measures (TSCM) are highly-specialised investigations into detecting and sweeping physical locations and/or communication devices for the presence of hidden recording equipment. These are hidden microphones, cameras, or movement sensors commonly referred to as “bugs.” The goal of TSCM is to identify existing security breaches and/or potential weaknesses to neutralise any risks.
Our trusted team of specialists, led by our experienced intelligence officer, will help you sweep and clear any locations including boardrooms, executive offices, trading floors, private accommodations, and corporate flats. With highly specialised equipment, and in close dialogue with you as the client, we clear areas of spy equipment and bugs.
In principle, all persons, businesses, and organisations who hold valuable information may be potential targets – including corporate businesses, law firms, non-profit organisations, charities, governments, and private individuals. If you are perceived to hold information that an opposing party have a major interest in, you qualify as a potential target. Examples can include executives and senior management, opponents in lawsuits, and successful investors.
Any area where valuable and important information is discussed that has not been secured or cleared.
Examples may include:
TSCM is an investment in the future, protecting all of the hard work and accomplishments you have with colleagues and others you trust.
What are the potential warning signs that you are the target of spying?
If you have experienced any of the warning signs above, contact and inform as few as possible. Reach out to our specialists via a newly purchased mobile telephone or from secure e-mail (e.g. Gmail with 2-step verification) from a new computer or another safety device.
We will immediately assess the potential risk, based on an interview and dialogue with you as a client.
When we close the case, we have eliminated any potential threats. If someone is listening in, we have found and secured the evidence.