Bug Sweeps - TSCM
Technical Surveillance Countermeasures or TSCM, is also known by the reference of "Bug Sweeps," and the more modern name of Electronic Eavesdropping Detection or EED. We are Certified Specialists in the detection and location of eavesdropping devices. Our product is privacy assurance and protection. Our Team is trained to the same specifications and utilizes the same equipment and techniques used by federal government. We use the state of the art OSCOR, an R.F. Spectrum Analyzer, as well as F.L.I.R., telephone and networks analyzers ($100,000). As you can see by the video, we have done numerous sweeps of homes, businesses and casinos throughout Las Vegas and across the world, traveling with clients.
Technology is constantly evolving. The technical aspects of Eavesdropping, (audio, video, cell phones, computer spy ware and GPS devices), has grown and these devices and methodologies are becoming easier, cheaper and better. In Nevada as in most states, you need to be a licensed Private Investigator to conduct theses counter eavesdropping sweeps. We are licensed and vetted to do so. Our video shows just a few of the hundreds of jobs we've successfully completed.
One of the most valuable commodities any person or organization has is its proprietary information. Whether it's a corporate deal or a divorce; with today's technology, audio, video and computer "bugging" is getting easier and easier to do. It's also getting harder and more costly to detect. Our "Bug Sweep" team can ensure your home, business office, conference room, exhibit space, meeting rooms, or hotel suite is clean and safe of hidden microphones, video cameras and tape recorders. Only you know if you have reason to believe whether someone is listening or watching, and if you think they are, then they probably are.
This Threat Analysis Eavesdropping Detection Sweep can be done in 6-8 hours. The hard line telephones are checked, a physical search is done and a radio frequency analysis is done for hidden wireless microphones and video cameras.
Our services will include at least the following:
Physical Inspection of all outlets, switches, and lighting for VLF/RF devices.
Physical Inspection of all PBX, LAN, and WAN connections and equipment.
Physical Inspection of all tables, chairs, desks, cabinets and furniture.
Analysis of all Radio Frequency electromagnetic emanations. (0-8GHZ)
Analysis of Infra-red and Laser emanations.
Active and passive light spectra examined.
Evaluation of computer network facilities and associated cabling.
Inspection of all Xerox, fax, and other imaging equipment.
All phone lines inspected and verified back to the central Telecom room.
Thermal imaging and analysis of inspected areas.
Most activities will overlap to provide complete coverage.
*Computers scanned for infections of spy ware. (if requested)
Upon arrival, one of the first things our team does is set up our OSCOR Spectrum Analyzer and deploy our mobile scanning systems, to search out nefarious Radio Frequency transmissions. This Spectrum Analyzer is a highly sensitive Radio Frequency test instrument that gains in very detailed picture of any frequencies that are broadcasting in the threat area. The scanners are placed at various ends of the target areas and several scans are begun, then hours later several more are done. These are compared and analyzed against each other, then reviewed and demodulated by myself for final review.
All Phones are scanned, as are the modems and networks. We use a telephone analyzer to ensure the phone programming protocols are undisturbed. We check all lines back to the main phone block and/or server room. We then open the phones and review them for any nefarious parasitic attachments. The carrying voltage is checked to ensure no attachments of any electronic parasitic devices we can’t see. We are certified computer forensic and ethical hackers, so when necessary we can review your computer systems, home networks, smart home applications and cell phones as required.
A Physical Search is a must and most competitors don’t do this due to the time involved. It’s part of our overall protocol on every job. The bigger the space is the more operators we bring in to get the job done within one day. During a Physical Search we are looking for any old dead devices, attached devices, electronic parasitic devices or wiring that does not fit. We must have complete access and, much like a cleaning crew, we go through everything, i.e. drawers, closets, attics, crawl spaces, etc. There have been 6 instances that we have actually found “dead” devices. They were all once active “bugs.”
"It is essential to seek out enemy agents who have come to conduct espionage against you and to bribe them to serve you. Give them instructions and care for them. Thus doubled agents are recruited and used." - Sun Tzu
Core Group Security (c) 2000 - Nevada P.I. & P.P. License 1558 & 1558A