Home/Services/Counter-Surveillance
Specialist · Service X

Counter-
surveillance

Unlawful eavesdropping is a real threat to businesses, organisations and individuals. We identify and eliminate technical threats – from hidden microphones to compromised digital devices.

Technical expertise
Discretion
Premises, vehicles and devices
Actionable recommendations

Protect your
communications

Eavesdropping is no longer a threat reserved for intelligence agencies and large corporations. With today's technology, advanced surveillance equipment can be purchased for a few hundred kronor and installed in minutes. Trade secrets, negotiation strategies and personal communications can be compromised without you noticing.

Our counter-surveillance service – also known as TSCM (Technical Surveillance Countermeasures) – involves a systematic search for technical threats in your premises, vehicles or digital devices. We identify any devices and provide concrete recommendations for protecting yourself going forward.

"What you don't know is leaking – that's what can hurt you most."
Common threats

Hidden microphones or transmitters in offices and meeting rooms

GPS trackers on vehicles

Compromised mobile phones or computers

Eavesdropping via Wi-Fi networks or Bluetooth

Optical eavesdropping through windows (laser-based)

The threat profile varies depending on your business and position. We tailor the inspection to your risk profile.

How we conduct
the inspection

A counter-surveillance sweep requires both technical equipment and experience. We conduct a systematic search covering the most common threat vectors.

01

RF sweep

We scan radio frequencies to identify active transmitters – hidden microphones, wireless cameras and GPS trackers communicating via radio.

02

Physical inspection

We conduct a thorough physical examination of premises, furniture, outlets, ventilation and other places where technical equipment can be concealed.

03

Network analysis

We examine your Wi-Fi network and local network infrastructure for unauthorised devices, anomalous traffic or security vulnerabilities.

04

Device screening

We check mobile phones, computers and tablets for spyware, unauthorised applications or configuration changes.

05

Vehicle inspection

When needed, we check vehicles for GPS trackers, hidden microphones or other devices.

06

Report and recommendations

The result is compiled in a report with any findings and concrete recommendations for strengthening your protection going forward.

Approach

1

Needs assessment

We discuss your situation and risk profile. What needs to be protected? Which threats do you consider most relevant?

2

Planning

We plan the inspection based on your premises, devices and specific requirements. The inspection can be conducted during or outside working hours.

3

Execution

The inspection is performed discreetly and systematically. Depending on scope, it takes a few hours to a full working day.

4

Report

You receive a report with findings (or absence of findings), risk assessment and recommendations for future protection.

Frequently asked
questions

How do I know if I am being eavesdropped on?

+

The short answer: you probably don't. Modern surveillance equipment is extremely difficult to detect without professional equipment. That is precisely why a technical inspection is important if you have reason to suspect it.

How long does an inspection take?

+

It depends on the area and scope. A single office room typically takes 1–2 hours. A full inspection of an office suite with multiple rooms takes half a day to a full day. Vehicle inspections normally take 30–60 minutes.

Should we conduct regular inspections?

+

If your business handles sensitive information, we recommend regular inspections – for example quarterly or before important meetings and negotiations.

What does it cost?

+

The price depends on the size of the premises and the scope of the inspection. Contact us for a quote based on your specific needs.

Suspect you are
being monitored?

Contact us immediately – preferably not from the device or premises you suspect are compromised. We conduct a discreet inspection and give you clarity.

Contact us now →