TSCM

Electronic Bugs And Listening Devices, Are They Tracking You?

Technical Sweep Countermeasures (TSCM).  We have many Clients who call for a TSCM service to ensure their home or office are safe to discuss private conversations.  A TSCM sweep is conducted to determine if there are any covert (not openly acknowledge or displayed) audio or video devices within a home or business. Requesting a listening device detection or an electronic bug detection can expose various amounts of spyware that is concealed within normal products. For example, these types of devices could be a charger for a cellphone or computer with the capability to power your technology and spy on you at the same time, smoke detectors that will function properly, and listening devices that can be installed into products you welcome into your home like [...]

The Top Questions On What Information You Can Expect From A Private Investigator

We get a lot of questions with regards to specific requests for various types of investigations. Mostly:  Is it possible to get… A Driving History ~ Yes, to obtain a Driving History on an individual, we must have a valid reason to access the Bureau of Motor Vehicles.  EX:  Civil Litigation or Criminal Defense, Pre-Employment Background check (with authorization to release form signed by the Subject) Registration Records ~ Yes, We will pull the registration records while we are conducting surveillance to verify if in fact an individual is residing at a specific residence.  We will pull a registration record in the process of serving legal documents when the defendant or witness is dodging service.  We also pull registration records for a Civil Litigation Case [...]

Verbal or Written Communications are Not Always Private

Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”.  With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious.  Google the internet for mobile phone bugging and you will find many “offshore” providers that sell highly sophisticated cell phone spy software for usually less than a hundred bucks.  Carefully read the advertising material posted on these sites and you will find that they guarantee that the spy on cell software can’t be found.  They provide a detailed tutorial explaining how to remotely install phone spying software on a target phone.  Electronic eavesdropping is illegal in the United States and many [...]

Are you Bugged?

At we get at many inquiring calls inquiring about a TSCM (Technical Surveillance Counter Measures) sweep for listening devices.  TSCM sweeps have many informal names such as a bug sweep, electronic bug detection or counter surveillance services but whatever you chose to call the service it has one object in mind and that is to find any device with the capability to record audio and/or video of a target without their knowledge.  On these sweeps, we use some of the most sophisticated hardware available.  We have a hidden camera detector, listening device detection methods, RF video surveillance detection, as well as many other electronic bug sweep devices. During a TSCM sweep we analyze local RF and attempt to isolate RF frequencies emitting from within the [...]

Not Only Do I Hear What You Are Saying, So Is Someone Else

We had a gentleman who was on the verge of selling his multi-million dollar company.  He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island.  In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable.  The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings.  He had this feeling that something wasn’t right and he came to to hash over his suspicions to determine if that nagging warning was worth investigating. He [...]

Marriage Infidelity Claim Leads to Unexpected GPS Tracking

Some of the cases we get at can be pretty interesting – especially when it comes to suspected marital infidelity cases. Take for example, the case of the jealous, controlling husband who believed his wife was having an affair. Bob* and Meredith* had only been married for a year. While they were dating, Bob had been very sweet and attentive toward Meredith. But after their marriage, Bob was becoming more overbearing. He not only controlled all of their finances with an iron fist, but whenever Meredith came home late from work, he would question where she had been and who she had been with. When Meredith told her parents that Bob had accused her of having an extramarital affair with liaisons at a local hotel, [...]

Covert Surveillance with Four-legged Furry Spies

Would you consider a cat or dog roaming around your business or home as a possible security threat? What about if the animal was your own pet? At , we doubt you’d even consider it. But you may start to wonder about it after reading this blog post. According to an article in The Hacker News, a security researcher with a large security consultancy firm thought it would be fun to conduct an experiment in “weaponizing” his grandmother’s pet cat to map vulnerable WiFi networks in his neighborhood. He built a custom collar for Coco made from a Wi-Fi card, GPS module, Spark Core chip, battery and leopard-print fabric. He then set Coco loose. During the cat’s three-hour jaunt through the neighborhood, the security researcher [...]

Not All Office Spying is About Corporate Espionage

Many times, our clients are flabbergasted after we conduct a very confidential TSCM sweep of their offices. When TSCM services are combined with digital forensics, the findings catch them by surprise. It’s not uncommon for IT departments to be asked to monitor employee’s habits in surfing the Internet. Today with so much of the business world transacting business through the Internet, monitoring has been reduced to applying restrictions and developing Internet use policies. What Sort of Investigation? One C-level executive had a problem and contacted directly. He was a little uncertain about what he wanted. There was a female admin who was giving him some weird vibes. So much so that he went to personnel to find out where she had worked previously because he [...]

TSCM Services Still a Productive Measure for Investigation

In today’s highly advanced technical age, very often the common person can conduct some research, click on some links, learn a lot in a limited amount of time and trace down all kinds of information. But of course, even in this age of finding a lot about a lot in a limited amount of time, still has professional access to data bases that are unavailable to the average person. Then, we also make it our business to remain on the cutting edge of technology, especially regarding digital forensics, forensic computer analysis and forensic data recovery. Even with technology expanding in those directions, some people forget about the need for Technical Surveillance Countermeasures, or TSCM. Some believe that the collection of cell phones, tablets and other [...]

Surveillance Underscores the Intentions of Long Lost Uncle

Here at we are witness to the best in people as well as the dark underside of human interactions. We have front row seats to stories and actions that some people might not ever see or be able to understand. While they are human stories filled with a wide array of emotions, we are involved in gathering facts and finding out the truth. Often our work involves attorneys who are working with an estate. We are tasked with finding a missing heir or unknown heirs for the estate. However, sometimes estate work requires a different kind of investigation. Take this story for instance: Soon after their mother was admitted into hospice, Janet and Kim’s long-lost uncle Scott suddenly began to visit the dying sister he [...]

Go to Top