You searched for:

What should I do if I suspect I may be under surveillance, or have been bugged?


What should I do if I suspect I may be under surveillance, or have been bugged? Use secure communication methods. To minimise risk of leaking sensitive information, your first course of action is to use secure communication methods outside of the area(s) you suspect are under surveillance. If you suspect industrial espionage it may also […]


Where do spies hide bugs?


Where do spies hide bugs? Where are you likely to be targeted by listening devices? Offices, boardrooms, internal telephone systems, mobile phones and computers are the places where most people believe that bugs might be concealed by hostile operatives looking to steal secrets. However it is clear to industry insiders that eavesdropping is not confined […]


What is the best way to contact a competent TSCM (bug sweeping) company?


What is the best way to contact a competent TSCM (bug sweeping) company? Contacting a counter surveillance company. Making contact with a TSCM (bug sweeping) company can be done in a number of ways. Most of our new clients do so through a recommendation by a satisfied customer, or via our website. If you believe […]


What can I expect from a competent TSCM Bug Sweeping Company?


What can I expect from a competent TSCM Bug Sweeping Company? Do not be fooled into conducting a bug sweep on the cheap. It is essential that a sweep is carried out professionally if it is to have any hope of success in finding hidden bugs. Sweeps take time and effort and should be conducted […]


What can I expect to pay for a professional TSCM counter surveillance inspection?


What can I expect to pay for a professional TSCM counter surveillance inspection? The cost of counter surveillance inspections. The cost for a professional TSCM operation is not fixed, but is dependent upon a number of factors: The size and number of rooms/vehicles to be inspected. The amount of telephone/fax/computer lines and cabling to be […]


How do I determine the scope of areas to be included in a counter espionage inspection?


How do I determine the scope of areas to be included in a counter espionage inspection? The scope of a counter surveillance inspection. The areas for inclusion in a TSCM (bug sweeping) inspection are assessed during the initial meeting with the counter surveillance service supplier. This initial risk assessment will focus on the most likely […]


How can I implement a TSCM (bug sweeping) or Counter Surveillance Policy?


How can I implement a TSCM (bug sweeping) or Counter Surveillance Policy? Implementing a counter surveillance policy. The first step is to research and decide upon a suitable and reputable TSCM or counter surveillance service supplier. After initially contacting the chosen TSCM (bug sweeping) company, normal practise would be to arrange for an initial in depth […]


How much bugging and unauthorised surveillance occurs?


How much bugging and unauthorised surveillance occurs? The covert nature of unauthorised surveillance and bugging makes predicting the scale quite difficult. A successful covert surveillance operation if executed correctly will leave no trace of the activity having taken place. This makes it difficult to make an accurate prediction of how much electronic eavesdropping and industrial […]


I think I have discovered a device (bug): what should I do?


I think I have discovered a device (bug): what should I do? What to do if you think you have discovered a bugging device. If you think you have discovered an unauthorised bug or surveillance device in your workplace or at home, there are five basic actions to consider taking: Do not discuss the discovery […]


How long will a counter surveillance inspection take?


How long will a counter surveillance inspection take? The duration of a TSCM (bug sweeping) inspection is dependent on several major factors, including: The number and size of the target rooms to be inspected. The amount of electronic and electrical equipment within the area. The amount of structured cabling and complexity of telecommunications equipment in […]