Countersurveillance (TSCM)

We have undertaken extensive reviews to uncover all possible compromises, including leaks relating to confidential company information. We explain how our monitoring and error detection measures work  so you know what to expect. Our services include a wide range of cross-monitoring tools and services for private and public enterprises. Please note that we do not sell or install any monitoring or counter-monitoring equipment. 
    
Determine whether your property, vehicle, computer or mobile phone needs to be inspected and conduct a thorough investigation to detect suspicious activity such as unauthorised access to your computer or phone or the presence of a suspicious device.
    
Our experienced counter-surveillance experts sweep your home or office to ensure that your secrets are not passed on to the snoopers. There is no risk that your secrets will leak or fall into the wrong hands, or worse, that they will harm you.
    
You may suspect that an individual or a specialized surveillance team is watching, following or pursuing you. Counter-surveillance strategies can reveal your intentions, and counter-surveillance teams can be deployed at short notice and will contact you to formulate a plan. We can help customers who feel they are being subjected to hostile surveillance or unwanted attention.
    
We use sophisticated techniques with state-of-the-art infrared and thermal imaging technology to detect the heat emission of illegal listening devices, whether active or at rest. This includes identifying and locating the location of electronic bedbugs and other telltale signs emanating from their place of planting.
    
In this category, devices for monitoring are presented, including radio frequency detectors (RF), commonly referred to as bug detectors. While the detection of transmissions is only as good as the frequency of the transmission itself, more modern RFs, for example, are able to determine the actual frequency. If we are looking for eavesdropping or other eavesdropping devices, we can monitor with a much higher frequency than with a standard RF detector.
    
The closer you get to the signal, the more vibrations or audio noises the device can hide and detect if the transmitted signal is in the room. More advanced devices can even tell you what the frequency is, for example there is a difference between a low frequency (low frequency) signal and a high frequency signal. One of the most commonly used types of anti-surveillance equipment is the radio frequency detector (RF). These devices can detect if you are in a room with a RF detector, radio frequency detector or wireless antenna.

This involves several different steps, such as removing the monitoring devices, installing a new monitoring device and searching for the device itself.Monitoring takes place on a literal display, and after selecting an area, items such as lamps and furniture are inspected that can hide microphones and cameras. 
    
While open surveillance acts as a means of control and deterrent, covert surveillance obscures the mechanisms behind the loss of privacy to the authority. There is a strong correlation between the number of devices and the extent of surveillance and data protection.