Technical Surveillance Countermeasures Services
Protecting your people, information and assets.
Intelligence-lead approach to protecting you and your assets.
A Technical Surveillance Countermeasure (TSCM) survey (often referred to as bug sweeping) is a systematic physical and technical inspection of areas to detect and locate illicit eavesdropping devices. We use intelligence to identify the areas of high risk, and align our deployment strategies accordingly. Using the latest technology, we offer this service to both public and private clients and can deliver a suite of solutions which security & investigation teams can utilise when required.
Frequently Asked Questions
How we can help you
Whether you’re seeking to proactively protect your information or you feel that you may have been the victim of surveillance, with over 25 years of delivering TSCM expertise across the public and private sector, we can help to minimise the threat of exposure to your confidential information.
Once we have an understanding of the circumstances around your requirement a comprehensive survey will be conducted, where we will also assess the environment for other covert threats that could allow information to leave the location. On completion, our findings will be detailed in a report, along with our recommendations on further mitigation strategies that can be incorporated if required. If a device is found, we’ll advise on the most appropriate course of action.
Our Reach
From data centres to FSC sites, hotels and offices, we conduct TSCM surveys in a number of locations:
- Construction/refurbishment sites
- Boardrooms
- Vehicles
- Residential properties
- Cable testing
- Conference & exhibition facilities
- CNI sites
- Laboratories
- Data Centres
- Aircraft and super yachts
Live Monitoring
We understand how important your assets and information are. To compliment a TSCM survey prior to a board meeting or off-site event, we can provide live monitoring for the entire duration of meetings, events and conferences.
With a team of skilled engineers present on-location, continuous live monitoring will detect whether any new devices have been introduced that may compromise your conversations and information.
For more information about live monitoring, visit our In-Place Monitoring Systems page.