Technical Surveillance Counter-measures (TSCM) is the art and science of bug-sweeping and/or electronic countersurveillance. TSCM looks for, finds, and stops audio and video bugs.
Crucial Point provides TSCM services by leveraging highly trained technical staff that has led government counterintelligence and technical countermeasures for intelligence community and law enforcement agencies.
This team performs a complete inspection leveraging the most modern detection devices on the market, using them to elicit responses from bugs to determine their location. We detect devices that are connected by RF, WiFI, BlueTooth and cellular. We detect microphone taps and telephone taps. We detect carrier current bugs, micro wireless video devices, laser and infrared eves dropping devices. The inspection will detect devices that use low voltage, intermittent transmit and devices that require periodic take via manual servicing (namely, a non-transmitting device that requires a person to swap out the recording device module manually).
We are trained on and operate a wide range of commercial gear that will find covert audio and video bugs. We detect devices using best practices leveraged by intelligence and law enforcement agencies and do so in a way known to counter sophisticated nation-state sponsored espionage collection. We also find devices that might be part of campaigns conducted by criminal groups or activists.
The equipment we use includes modern, state-of-the-art spectrum analyzers and signal generators designed specifically to detect unauthorized devices.
Prior to any sweep we work with our clients to determine the optimal game-plan if a device is found. The right path forward varies from company to company and we will work with you to ensure we are ready to achieve optimal outcomes for you.
Let us know if we can provide more information.
Important Note: If you suspect your office has been penetrated with listening or video recording devices remember to use good security when communicating with us. For example, you can leave us a cell number for us to call you on and we can discuss it when you are outside of your office. It is also important NOT to discuss this with others on your team unless you are sure you are in a space that cannot be observed/recorded/listened to by the potential adversary. And keep knowledge of this to a minimum in your organization, they wrong chatter can cause an adversary to suspect something is up.
For more contact us here.