
Technical Sweep Countermeasures (TSCM). We have many Clients who call for a TSCM service to ensure their home or office are safe to discuss private conversations. A TSCM sweep is conducted to determine if there are any covert (not openly acknowledge or displayed) audio or video devices within a home or business. Requesting a listening […]

We get a lot of questions with regards to specific requests for various types of investigations. Mostly: Is it possible to get… A Driving History ~ Yes, to obtain a Driving History on an individual, we must have a valid reason to access the Bureau of Motor Vehicles. EX: Civil Litigation or Criminal Defense, Pre-Employment […]

Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”. With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious. Google the internet for mobile phone bugging and you will find […]

At we get at many inquiring calls inquiring about a TSCM (Technical Surveillance Counter Measures) sweep for listening devices. TSCM sweeps have many informal names such as a bug sweep, electronic bug detection or counter surveillance services but whatever you chose to call the service it has one object in mind and that is to […]

We had a gentleman who was on the verge of selling his multi-million dollar company. He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical […]

Some of the cases we get at can be pretty interesting – especially when it comes to suspected marital infidelity cases. Take for example, the case of the jealous, controlling husband who believed his wife was having an affair. Bob* and Meredith* had only been married for a year. While they were dating, Bob had […]

Would you consider a cat or dog roaming around your business or home as a possible security threat? What about if the animal was your own pet? At , we doubt you’d even consider it. But you may start to wonder about it after reading this blog post. According to an article in The Hacker […]

Many times, our clients are flabbergasted after we conduct a very confidential TSCM sweep of their offices. When TSCM services are combined with digital forensics, the findings catch them by surprise. It’s not uncommon for IT departments to be asked to monitor employee’s habits in surfing the Internet. Today with so much of the business […]

In today’s highly advanced technical age, very often the common person can conduct some research, click on some links, learn a lot in a limited amount of time and trace down all kinds of information. But of course, even in this age of finding a lot about a lot in a limited amount of time, […]

Here at we are witness to the best in people as well as the dark underside of human interactions. We have front row seats to stories and actions that some people might not ever see or be able to understand. While they are human stories filled with a wide array of emotions, we are involved […]