TSCM services

Not Only Do I Hear What You Are Saying, So Is Someone Else

We had a gentleman who was on the verge of selling his multi-million dollar company.  He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island.  In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable.  The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings.  He had this feeling that something wasn’t right and he came to to hash over his suspicions to determine if that nagging warning was worth investigating. He [...]

Marriage Infidelity Claim Leads to Unexpected GPS Tracking

Some of the cases we get at can be pretty interesting – especially when it comes to suspected marital infidelity cases. Take for example, the case of the jealous, controlling husband who believed his wife was having an affair. Bob* and Meredith* had only been married for a year. While they were dating, Bob had been very sweet and attentive toward Meredith. But after their marriage, Bob was becoming more overbearing. He not only controlled all of their finances with an iron fist, but whenever Meredith came home late from work, he would question where she had been and who she had been with. When Meredith told her parents that Bob had accused her of having an extramarital affair with liaisons at a local hotel, [...]

Bug Sweeps Can Protect Your Confidential Information

Did you see the recent stories about the National Football League (NFL) conducting a bug sweep in the New York Jets’ locker room before their Week 7 game against the New England Patriots at Gillette Stadium? It was the talk of all the sports media outlets for several days, given DeflateGate and other instances in which the Patriots have been accused of potential cheating. Funny thing though the Jets said they didn’t make the request for the listening device sweep. But Mike Florio of Pro Football Talk says the electronic bug detection sweep did occur. Eventually, NFL spokesperson Brian McCarthy responded by saying that the NFL has conducted regular, random sweeps of locker rooms for listening devices for years. However, the league does not provide [...]

Covert Surveillance with Four-legged Furry Spies

Would you consider a cat or dog roaming around your business or home as a possible security threat? What about if the animal was your own pet? At , we doubt you’d even consider it. But you may start to wonder about it after reading this blog post. According to an article in The Hacker News, a security researcher with a large security consultancy firm thought it would be fun to conduct an experiment in “weaponizing” his grandmother’s pet cat to map vulnerable WiFi networks in his neighborhood. He built a custom collar for Coco made from a Wi-Fi card, GPS module, Spark Core chip, battery and leopard-print fabric. He then set Coco loose. During the cat’s three-hour jaunt through the neighborhood, the security researcher [...]

Is Using Surveillance Equipment Good or Bad?

If you watch TV at all, you hear continual references to closed circuit TV. In fact, if you spend time in the UK or other European countries you will see them everywhere. We realize that makes some people feel uneasy, but there are two sides to surveillance equipment. The Crime Prevention Side of Surveillance Equipment Not sure if I should call it crime prevention because it only seems to deter those who respect the law to begin with, but cameras can be installed inside and around public space and places of business to: Record evidence of theft and other wrongdoing such as vandalism. Authorities routinely use CC TV recordings to identify robbers and submit images to the public for help in apprehending the perpetrators. Employers [...]

Burglary and Trickery Foiled by TSCM

After years of providing investigative services, here at , there are some things we understand. When someone’s home is burgled, the residents often lose the feeling of being safe and secure. But when someone’s homes is invaded twice in a very short time frame, that fear is mixed with confusion and uncertainty. Sandy* had moved out of her home after the second incident. She was afraid, and not quite sure why the burglary had been repeated. In each instance, some possessions had been taken: a computer, some collectibles, and then some things like BlueRay movies, CDs and even a few books. It didn’t make sense to her and it sounded unusual to us, too. Since there was a chance the home would be invaded again, [...]

If You Think You Need to Talk to a Private Investigator, You Probably Should

Years of experience has taught a few things to the professionals at . And one of the top rules of thumb we encourage you to follow? Well, we suggest that if you're thinking that you should speak to a private investigator, chances are good that you should do exactly that. In our business, we've often seen that when a person has a hunch, it's for a good reason. Even if you can't quite verbalize what you think is out of place or wrong or not honest, always listen to your intuition. In the opinion of , that sixth sense or intuition or whatever you choose to call it … well, it's rarely wrong. Around our office, we have lots of respect for intuition. In fact [...]

Are You a Targeted Individual for Blackmail

Are you a TI? That is, a Targeted Individual? A Targeted Individual is someone who is illegally or covertly harassed, abused, stalked or spied upon continuously by a group of people, an organized surveillance. Being a Targeted Individual is more than a boyfriend, spouse or colleague who installs cell phone spyware or conducts cell phone surveillance. It is less about following and spying and more about harassment and psychological abuse, potentially physical harm as well. That being said, one of the first steps taken by may be mobile phone hack detection or mobile phone spyware detection. Let me explain using a scenario that is becoming more and more common and compel clients to call . Zach was a prominent real estate executive in a large [...]

4 Reasons Businesses Should Conduct Technical Surveillance Countermeasures

Sometimes business owners and leadership of businesses can’t believe that their business would be the target of any corporate espionage or illegal activity. But innovative small businesses have become not only a hotbed of technological advances, but the victim of crimes that devastate their enterprise. For that reason, here at , we want every business owner to be aware of the top 4 reasons to conduct Technical Surveillance Countermeasures (TSCM). TSCM is most commonly referred to as bug detection. But TSCM is also used to detect phone tapping devices, listening devices, electronic surveillance equipment and other sorts of spy equipment. Knowing that TSCM is for spy detection, some business owners might immediately say they don’t need these services. But if any of these situations come [...]

Technology Advances: The Need to Sweep for Bugs Grows

At , we understand that you need cold, hard facts. No assumptions. No guesses. Just the facts. We have the most advanced tools to get that job done. We still use basic skills of traditional investigations, such as surveillance. But we have access to very sophisticated surveillance equipment. To conduct research, we use highly advanced data bases. And when we have access to computers and cell phones, we search for the truth through digital forensics. In addition, we are experts at TSCM – Technical Surveillance Countermeasures. So when you suspect that your office has been bugged, we are the professionals who can answer that question for you. As we have all seen in movies about espionage, wire tapping or a phone tap can be used [...]

Go to Top