FREQUENTLY ASKED QUESTIONS
-
Not always. If we do find a bug, we keep searching; spies often plant multiple bugs. We do a thorough check every time to ensure no stone is left unturned.
-
Based in Madison, WI, we focus on the Midwest. But we go wherever needed, bringing our top-notch expertise, training, and equipment nationwide. Learn more >
-
We customize our TSCM services to fit your needs. Most often, we offer:
Electronic surveillance threat assessment
Complete sweep of spaces needing privacy
Detection and removal of all type of active, passive, wired, cellular, Bluetooth, and battery-powered bugs, including: hidden microphones, hidden listening devices, hidden cameras, hidden video and audio recording devices, spy cameras, GPS trackers (AirTags, Tiles, etc.)
Examination of existing electronics: audio/visual equipment, fax machines, printers, phones
Post-inspection briefing and threat-reduction recommendations
-
We use a variety of techniques and the following equipment to detect bugs:
Frequency Spectrum Analyzers
Ultra-Sensitive VLF/UHR/IR Analyzers
Near Field Strength Detectors
Telephone/Network Line Analyzer
Time Domaine Reflectometer
Wireless Camera/Video Receiver/Interceptor
GSM (Cell Phone), Wi-Fi, and Bluetooth Detector
IR/Thermal Imagery Equipment
Non-Linear Junction Detector/Evaluators
Borescopes, Multi-Meters and Other Physical Inspection Tools
-
We undergo continuous training on emerging trends in the privacy and security protection industry. We’re happy to send you more information about our comprehensive training and certifications.
-
Modern eavesdropping tools have extended range and battery life, and with Wi-Fi / Bluetooth capabilities, data can be retrieved by spies remotely without ever recovering the device. From $20 gadgets on Amazon to more advanced technology and trackers, bad actors have countless options. They often deploy multiple tools, even planting obvious bugs to trick targets into thinking threats are neutralized while hidden devices continue gathering intel.
-
We handle all forms of technical surveillance threats, including:
Audio Listening devices/ eavesdropping devices
Hidden cameras/spy cameras/Voyer cameras
Wiretaps and data intercepts
GPS trackers and air tag type devices