Bug sweep or Technical Surveillance Counter Measures (TSCM) are highly-specialised investigations into detecting and sweeping physical locations and/or communication devices for the presence of hidden recording equipment. These are hidden microphones, cameras, or movement sensors commonly referred to as “bugs.” The goal of TSCM is to identify existing security breaches and/or potential weaknesses to neutralise any risks.
How we operate with a Bug Sweep
Our trusted team of specialists, led by our experienced intelligence officer, will help you sweep and clear any locations including boardrooms, executive offices, trading floors, private accommodations, and corporate flats. With highly specialised equipment, and in close dialogue with you as the client, we clear areas of spy equipment and bugs.
Who are potential targets of spying?
In principle, all persons, businesses, and organisations who hold valuable information may be potential targets – including corporate businesses, law firms, non-profit organisations, charities, governments, and private individuals. If you are perceived to hold information that an opposing party have a major interest in, you qualify as a potential target. Examples can include executives and senior management, opponents in lawsuits, and successful investors.
Bug Sweep: Where would a spy device typically be hidden?
Any area where valuable and important information is discussed that has not been secured or cleared.
Examples may include:
- Business offices, boardrooms, and trading floors
- Private and executive residences
- Corporate apartments
- Vehicles (cars, aircraft, boats)
- Home phones (landlines)
- Off-site locations for business meetings (hotels, conference venues, etc.)
TSCM is an investment in the future, protecting all of the hard work and accomplishments you have with colleagues and others you trust.
What are the potential warning signs that you are the target of spying?
- Investments and/or ideas you hold close are exposed and others copy these
- A significant and unexplained decrease in sales or loss of target customers
- Your business strategies are compromised and copied
- You receive early warnings that your pricing and sales strategy may have been leaked
If you have experienced any of the warning signs above, contact and inform as few as possible. Reach out to our specialists via a newly purchased mobile telephone or from secure e-mail (e.g. Gmail with 2-step verification) from a new computer or another safety device.
We will immediately assess the potential risk, based on an interview and dialogue with you as a client.
When we close the case, we have eliminated any potential threats. If someone is listening in, we have found and secured the evidence.