• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Crucial Point LLC

Accelerating Technology

  • About Crucial Point
    • About Bob Gourley
    • Announcements
    • Corporate Events
    • Press
    • CTOvision
      • Go Pro!
  • Contact Us
  • Services
    • Technology Due Diligence
    • CTO Advisory Services
    • Compliance and Cybersecurity
    • CTO-as-a-Service
    • CISO-as-a-Service
    • Corporate Events
  • Crucial Point Clients
  • Cybersecurity Best Practices
    • Cybersecurity Best Practices
    • Cybersecurity At Home
    • Health Insurance Portability and Accountability Act (HIPAA) Security Rule Compliance
    • The FFIEC Cybersecurity Assessment Tool Can Be Used To Raise Your Security Posture
    • Companies Who Interact With European Citizens Must Check Architecture For Compliance With New Data Rules

Electronic Bug Sweeps: Ensure you are not being recorded by video or audio surveillance gear

Home ยป Electronic Bug Sweeps: Ensure you are not being recorded by video or audio surveillance gear

Technical Surveillance Counter-measures (TSCM) is the art and science of bug-sweeping and/or electronic countersurveillance. TSCM looks for, finds, and stops audio and video bugs.

Crucial Point provides TSCM services by leveraging highly trained technical staff that has led government counterintelligence and technical countermeasures for intelligence community and law enforcement agencies.

This team performs a complete inspection leveraging the most modern detection devices on the market, using them to elicit responses from bugs to determine their location. We detect devices that are connected by RF, WiFI, BlueTooth and cellular. We detect microphone taps and telephone taps. We detect carrier current bugs, micro wireless video devices, laser and infrared eves dropping devices. The inspection will detect devices that use low voltage, intermittent transmit and devices that require periodic take via manual servicing (namely, a non-transmitting device that requires a person to swap out the recording device module manually).

We are trained on and operate a wide range of commercial gear that will find covert audio and video bugs. We detect devices using best practices leveraged by intelligence and law enforcement agencies and do so in a way known to counter sophisticated nation-state sponsored espionage collection. We also find devices that might be part of campaigns conducted by criminal groups or activists.

The equipment we use includes modern, state-of-the-art spectrum analyzers and signal generators designed specifically to detect unauthorized devices.

Prior to any sweep we work with our clients to determine the optimal game-plan if a device is found. The right path forward varies from company to company and we will work with you to ensure we are ready to achieve optimal outcomes for you.

Let us know if we can provide more information.

Important Note: If you suspect your office has been penetrated with listening or video recording devices remember to use good security when communicating with us. For example, you can leave us a cell number for us to call you on and we can discuss it when you are outside of your office. It is also important NOT to discuss this with others on your team unless you are sure you are in a space that cannot be observed/recorded/listened to by the potential adversary. And keep knowledge of this to a minimum in your organization, they wrong chatter can cause an adversary to suspect something is up.

For more contact us here.

Also see our CTO-as-a-Service and CISO-as-a-Service offering.

Spread the word:

  • Twitter
  • Facebook

Primary Sidebar

Our Latest

OODA LLC: Put our team of experts on your side

Crucial Point is now part of OODA LLC. OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and … [Read More...] about OODA LLC: Put our team of experts on your side