FREQUENTLY ASKED QUESTIONS

  • Not always. If we do find a bug, we keep searching; spies often plant multiple bugs. We do a thorough check every time to ensure no stone is left unturned.

  • Based in Madison, WI, we focus on the Midwest. But we go wherever needed, bringing our top-notch expertise, training, and equipment nationwide. Learn more >

  • We customize our TSCM services to fit your needs. Most often, we offer:  

    • Electronic surveillance threat assessment

    • Complete sweep of spaces needing privacy

    • Detection and removal of all type of active, passive, wired, cellular, Bluetooth, and battery-powered bugs, including: hidden microphones, hidden listening devices, hidden cameras, hidden video and audio recording devices, spy cameras, GPS trackers (AirTags, Tiles, etc.)

    • Examination of existing electronics: audio/visual equipment, fax machines, printers, phones

    • Post-inspection briefing and threat-reduction recommendations

  • We use a variety of techniques and the following equipment to detect bugs:

    • Frequency Spectrum Analyzers

    • Ultra-Sensitive VLF/UHR/IR Analyzers

    • Near Field Strength Detectors

    • Telephone/Network Line Analyzer

    • Time Domaine Reflectometer

    • Wireless Camera/Video Receiver/Interceptor

    • GSM (Cell Phone), Wi-Fi, and Bluetooth Detector

    • IR/Thermal Imagery Equipment

    • Non-Linear Junction Detector/Evaluators

    • Borescopes, Multi-Meters and Other Physical Inspection Tools

  • We undergo continuous training on emerging trends in the privacy and security protection industry. We’re happy to send you more information about our comprehensive training and certifications.

  • Modern eavesdropping tools have extended range and battery life, and with Wi-Fi / Bluetooth capabilities, data can be retrieved by spies remotely without ever recovering the device. From $20 gadgets on Amazon to more advanced technology and trackers, bad actors have countless options. They often deploy multiple tools, even planting obvious bugs to trick targets into thinking threats are neutralized while hidden devices continue gathering intel.

  • We handle all forms of technical surveillance threats, including:

    • Audio Listening devices/ eavesdropping devices

    • Hidden cameras/spy cameras/Voyer cameras

    • Wiretaps and data intercepts

    • GPS trackers and air tag type devices

Learn more about how we can help you protect your privacy.