TSCM — Technical Surveillance Counter-Measures

Counter-surveillance sweeps for executive offices, board rooms, negotiation venues, and high-assurance environments. Discreet, on-site engagements delivered with calibrated detection equipment.

Why TSCM Matters

Sensitive commercial information — M&A negotiations, board deliberations, intellectual property strategy, executive personnel matters — is frequently the target of covert technical surveillance. Modern surveillance devices are small, inexpensive, often GSM/Wi-Fi/LoRa-enabled, and can transmit for weeks on a single battery. A periodic TSCM sweep validates that the environments in which your most sensitive conversations occur are not actively compromised.

Sweep Methodology

  • Pre-engagement intelligence — quiet site reconnaissance, threat-actor assessment, and operational security planning
  • RF spectrum analysis — across cellular, Wi-Fi, Bluetooth, Zigbee, LoRa, and licensed/unlicensed sub-GHz bands
  • Non-Linear Junction Detection (NLJD) — locates semiconductor electronics regardless of power state
  • Thermal imaging — identifies active electronics behind walls, ceilings, and furnishings
  • Physical inspection — fixtures, fittings, network sockets, electrical outlets, smoke detectors, presentation equipment
  • Telephony and network audit — VoIP infrastructure, conferencing systems, structured cabling integrity
  • Acoustic leakage assessment — windows, partitions, HVAC ducting
  • Reporting — written report with findings, photographic evidence, and remediation recommendations

Engagement Models

  • One-off sweep — pre-meeting, post-incident, or post-construction validation
  • Scheduled programme — quarterly or semi-annual sweeps for permanently sensitive environments
  • Travel sweep — hotel suites, meeting rooms, and conference venues prior to a high-value engagement
  • Vehicle and aircraft inspection — for executive transport

Operational Confidentiality

All TSCM engagements are delivered under strict confidentiality. Findings are reported to a single named recipient, evidence is retained for an agreed period and securely destroyed, and our consultants operate under non-disclosure agreements compatible with the most restrictive corporate and government information-classification regimes.