What are Technical Surveillance Counter Measures (TSCM)?


TSCM; also known as electronic bug detection, bug sweeping or surveillance counter measures; is the method of electronically and physically inspecting offices, buildings, homes, vehicles, telephone systems, network systems and cabling for the existence of eavesdropping devices and to identify weaknesses in security that could potentially be used to install illegal devices.


What is the threat or cost of being complacent in this area?


FACT: The old complacent attitudes of “ It won’t happen to us” or  “That doesn’t happen over here” is no protection when facing Litigation or Bankruptcy. Neglect often equals negligence and that alone can be so damaging you may never recover.


FACT: The Threat of Electronic Bugging is Very Real! The Cost Of Not Acting Can Cost You Financially, Close Your Business, Land You In Court, or Put You In Danger!


FACT: “Competitive Intelligence” is sometimes used as a politically correct term for Industrial Espionage. The number of people worldwide advertising this skill in their professional profiles and LinkedIn, numbers in the hundreds of thousands! Their skills may range from standard social engineering techniques to sophisticated covert electronic installations.


FACT: Electronic bugs, listening devices, hidden cameras, Bluetooth bugs, infra-red beams, burst/packet bugs, spread spectrum and other similar eavesdropping devices are all easily available over the internet to anyone with a credit card.


FACT:  The discovery of hidden recording devices and transmitters has increased dramatically as they have become more readily available and simpler to use. This practice is no longer limited to covert operatives. Even someone with only a Primary School education could ruin you or your company!


FACT: The cost of Cybercrime and Industrial Espionage in Australia alone amounts to over $4.6 Billion Dollars per annum! (AON) Worldwide this figure jumps to over $445 Billion!(CSIS) Keep in mind this is only what gets reported as many companies stay silent for fear of harming their stock value.


FACT: The cost of not implementing a comprehensive security architecture in your environment leaves you vulnerable! Choosing to ignore your concerns or suspicions leaves you open to numerous threats including theft, blackmail, financial losses, and litigation!


What is the Unique NSI Methodology?


What is unique to NSI is that we assess your ENTIRE working environment including the premises, the staff, your practices, your technology, and external threats.


After completing a full technical threat assessment, a bespoke security package is designed for your specific environment and circumstances. We uncover every vulnerability that rogue elements would exploit in order to steal from or damage you.


Part of this is your TSCM Bug Sweep which comprises of:

  • Physical search for hidden transmitters, microphones, and cameras.
  • Radio frequency spectrum analysis;
  • Non-Linear Junction Evaluation;
  • Thermal Emissions Analysis;
  • Telephone and network analysis;
  • VoIP system analysis;
  • Electronic inspection for covert video setups;
  • Carrier current analysis of AC outlets and cabling throughout the premises.

Another unique attribute we have is the equipment our TSCM Bug Sweep team uses is commissioned by Intelligence agencies, Defence departments and governments worldwide, especially Australia (DFAT, DoD, ASD).


With this equipment we are able to detect the presence of active and passive bugging devices, digital burst/packet bugs, hidden camera setups, keystroke logging devices, telephone interception and wiretaps, laser and infrared beams and more. We always keep up with new technologies to ensure you get the best possible service.


We can currently scan up to 43 GHz in real time, more than any other portable device or equipment on the market. As a comparison, devices used by other companies in Australia will generally scan up to 12 GHz and only some companies will have a 24 GHz capability.


Beware anyone who tells you this is not necessary may be making excuses for not having the clearance, training, or budget necessary to purchase Government Grade Equipment. Worse yet they may be unaware or inexperienced with detecting such sophisticated devices.





If you suspect someone is spying on you at your workplace or premises – call us immediately! However, do it from a safe location, i.e. phone box or mobile phone away from the potential threat. Avoid significant discussions in the surrounding area until we are able to confirm the room or phone line is safe. Our experienced operatives will arrange a private meeting and determine the best course of action to take in order to save your intellectual property, financial data, and trade secrets from being stolen.