top of page
karışarak Bulanık insanlar



A Technical Surveillance Countermeasure (TSCM), also known as a “bug” sweep or electronic surveillance sweep, is a highly-specialized service that detects the presence of eavesdropping devices such as hidden microphones or “bugs.” The goal of a Technical Surveillance Countermeasure is to identify existing security breaches and/or potential weaknesses in technical and communications security and to recommend corrective action to neutralize the risks.

Our company uses world-class devices for to detect any kind of listening or recording devices that are called as bugs,. 100% of possible hidden cameras and listening devices are successfully detected in the environment. Our work details are briefly as mentioned below


Our clients include financial institutions, major corporations, law firms, and governmental and non-profit entities. We offer a range of TCSM services including:

  • Electronic eavesdropping detection

  • Anti-surveillance services

  • Wiretap and covert camera detection

  • Communications security (COMSEC

  • Technical security


Discretion and Confidentiality

Our Company places the highest premium on our client’s privacy. Due to the sensitive nature of electronic surveillance and eavesdropping, we ensure that your information will always remain confidential. Our goal is to assist clients maintain the integrity of their work environment against the threat of electronic eavesdropping.


Our company uses world-class devices for bugs and listening devices screening.  100% of possible hidden cameras and listening devices are successfully detected in the environment. Our work details are briefly as mentioned below

Frequency analysis is performed with computer aided spectrum analyzer. If there is a listening device that wirelessly broadcasts in the environment, we use other detectors to detect this location.

With our device that detects frequency in 0-12 GHz band, all the objects in the whole area and environment are scanned in detail.

In the 0-6 GHz band, the entire area is scanned in detail by the detector which performs precise scanning. The hidden camera detection device working in the 2.4 and 5.8 GHz frequency band is used to make scanning across the entire area for wireless hidden cameras. If a hidden camera is detected, images captured by the hidden camera are detected on the detector screen.

With the GSM detection detector, bugs are detected in the environment with possible sim card remote listening.

With the Non Liner detector, the environment can be scanned in detail and the listening device can be detected as active or passive.

The thermal map of all the objects in the environment is examined with the help of the thermal camera (television, keyboard, mouse, telephone, tv control, etc.), the wired devices, the wireless devices or the recording devices located inside the walls either are detected with the thermal camera.

Suspended ceilings, hidden lighting, etc., through telescopic cameras. By examining the fields in detail, all active-passive devices can be detected.

The laser listening is performed remotely with the laser listening detection device.

Analysis of the energy lines against the insects that can transfer the sound through the energy line obtained from the environment is done.

Scanned area, security vulnerabilities are detected to facilitate listening and to take measures to close these deficits.

In the case of vehicle scans, the targets are GSM and GPS receivers, GSM based

The listening device is searched in the other parts of the vehicle,

At the end of the study a detailed study report is prepared including the detected or possible risks and the measures against them.

With the CPM 700 frequency analyzer, the operator precisely locates the suspected frequency source by navigating the entire area in detail.


The thermal camera detects the latent camera and the spy bugs. Spy listening devices located at any point emit heat if it is active and detect the location of the device by sensing this heat with the thermal camera.


2.4 and 5.8 GHz band, and brings the camera's image to the operator's screen, where we can identify the hidden camera in the center.

Where would a listening device typically be hidden?

Any area in which important, valuable information would be openly discussed—in person or phone—which has not been secured. Examples we’ve seen include:

  • Business offices, including conference rooms, boardrooms and trading floors

  • Private residences

  • Executive residences

  • Corporate apartments

  • Vehicles (cars, aircraft, boats)

  • Mobile phones

  • Home phones (landlines)

  • Quarterly board meetingss

  • Off-site business meeting

What types of devices will you screen for during the sweep?

There are many types of electronic eavesdropping devices or bugs. During our Investigations TSCM sweep, we will typically search for the following devices:

  • Micro wireless video devices

  • Laser and infrared eavesdropping devices

  • Wire and microphone taps

  • Telephone taps

  • Carrier current device

Where can bugs be hidden?

Electronic eavesdropping devices (bugs) can be hidden in any room, device, furnishing or container that would typically be found in an office or home setting. Today’s eavesdropping devices are smaller, more sophisticated, less expensive and easier to hide than they have ever been. Video bugs have also grown in popularity, which can record or even transmit events live. The good news is that all of these devices are detectable with the right people, equipment and methodology.

What happens during a typical   TSCM examination?

Pre-sweep, our TSCM professionals will conduct a detailed examination of your location in order to:

  • Discretely determine threats to the location

  • Detect the presence of technical surveillance devices and hazards

  • Identify technical security weaknesses that may allow illegal penetration of your facility

  • Provide a professional evaluation of your facility’s technical security position

During the actual sweep, our team will perform a comprehensive visual, physical, and electronic inspection to determine the presence and location of any and all electronic eavesdropping devices. We will also identify other technical weaknesses that may exist in your security posture.

During visual inspections, we look for hidden eavesdropping devices in areas in which they are commonly found.

During physical inspections, we take it a step further, thoroughly examining furniture, outlet covers, ceilings, and other locations common for eavesdropping devices such as microphones, recording devices, transmitters, and camera systems.

Our electronic inspection leverages a variety of sophisticated equipment to identify and locate hostile signals and other telltale signs of eavesdropping equipment. Additionally, we survey AC electrical outlets, telephone cables, computer lines, and other wiring capable of transmitting communication, looking for wiretaps and other intercept devices.

After all TSCM sweeps, we provide a detailed written report of the results, and any recommendations for improving your technical security posture.

bottom of page