top of page

Bug Sweep, How's it Done?

A bug sweep, or technical surveillance countermeasures (TSCM), is the process of detecting electronic monitoring devices in certain locations. This is a service most often offered by technicians in the private sector. Furthermore, bug detection is a highly technical and specialized field in the private industry that only a few Investigators are capable of. A vast amount of skill and experience is required to perform TSCM along with very expensive instruments.

Spy Device Locations

Eavesdropping detection will involve searching residences, vehicles, offices, and many other locations. Furthermore, technicians can also use their skill to discover monitoring methods in software such as computers and smartphones. These are just a few examples of the many different places a listening device can be found.

Victims of Spy Devices

There are a multitude of reasons individuals and organizations could be subject to exploitations by monitoring devices. Businesses are sometimes found to be involved in corporate espionage: obtaining valuable company information from competitors. People are also occasionally the victim of spying for reasons such as personal disputes or unjustly retribution. Thankfully, with TSCM, the victims of eavesdropping devices have recourse.


Unfortunately, there is a wide variety of devices and methods unsavory people can use to spy on individuals. Getting a glimpse or an idea of these devices/ methods will make it apparent the sophistication of the equipment and skill needed to counter these monitoring devices. The methods of spying can be,

  1. Hacking a computer for obtaining audio and video

  2. Modifying phone systems for "room monitoring"

  3. Inserting hidden monitoring apps in a phone

  4. Hiding microphones

  5. Wiretapping of phone lines

  6. Infrared transmitters

  7. Radio frequency video cameras

  8. Wired CCTV Cameras

  9. Contact microphones

  10. Magnetic tape recorders

  11. Wire microphones

  12. Internal inductive telephone taps

  13. PBX hard-wire taps

  14. Accidental wiring vulnerabilities

  15. Inert frequency transmitters

  16. Radio Frequency telephone transmitters

  17. Frequency hopping transmitters

  18. Spread spectrum transmitters

  19. Carrier current transmitters

  20. Telephone infinity transmitters

Need TSCM Help?

spy devices

Does your business or home not feel right? What should you do if you feel like someone might be listening to your conversations?

New Data Risk Solutions & Investigations provides professional comprehensive Technical Surveillance Countermeasures (TSCM) also known as bug sweeping eavesdropping detection. Our Investigative technicians will provide bug sweeping eavesdropping detection for any vehicle, office, home, or room. Our Investigators will "sweep" offices, boardrooms, homes, and vehicles for hidden cameras, tapped phones, and electronic listening devices.

We only use the latest technology and techniques. Our experts are trained to deal with all aspects of transmitted voice/ data communications. Our experts are capable of inspecting for cutting edge listening devices and old school analogue devices, plus any means for which others can manipulate in order to listen-in to private conversations.

Any Other Questions?

We are always here to help:


bottom of page