Counter Surveillance


Our Private Investigators carry out Counter Surveillance de-bugging and detection in all areas and environments, we use some of the industries most advanced electronic counter surveillance and debugging equipment to locate all types of electronic listening devices / bugs, telephone taps, hidden video, radio and microwave devices.
Counter surveillance/ electronic de-bugging is an important tool for any business person or individual interested in protecting their privacy.
Whether it is a business competitor or a stalker, both can easily obtain low cost listening devices and wreak havoc on your business or personal life.

Our highly experienced counter surveillance private investigators can offer a discreet and confidential bug sweep and counter surveillance service to individuals who suspect they are being spied-on, or want to ensure their privacy is maintained.

The ever increasing availability of audio and video bugs available on the market from high street shops and the internet make it relatively easy for someone to spy on you and see and hear what you are doing in your own home.

TSCM -Technical surveillance counter measures

TSCM (Technical surveillance counter measures) is carried out by our counter surveillance agents, they have many years of experience in carrying out counter surveillance.

Our technology will guarantee that your place of business and home are free of electronic intrusion.

Highly specialised in their field, our investigators will uncover every piece of mobile or PC forensic evidence you need. On many occasions, people have tried to delete their files, but our skilled PC forensic investigators can recover this information.

The prices for counter surveillance bug sweeps throughout the UK are available here.

fullY confidential


How does it work?

In general our Private Investigators will conduct a two part search; looking for Hardwire, Radio Frequency, and laser / Infrared bugs. The two part search will consist firstly of a physical search, where we will inspect electronic equipment and suspect areas for known devices and then for the second part we will carry out an electronic RF spectrum and audio search using our counter surveillance equipment. 

Our Private Investigators will search all possible areas including telephones and phone lines both inside and outside the property.

Our Private Investigators have the bug sweeping and detection equipment and experience to
 carry out complete counter surveillance sweeps in the following locations.

Home, Office, Factory, Vehicle (car and van), Micro devices fitted in clothing,
Electronic equipment such as phones, laptops, computers, radios, televisions, clocks, lamps etc.

A Hardwire bug or transmitter is a listening device that is attached to your phone or phone line. It’s generally powered by the line or the phone itself, These are often hard to detect as they generally only transmit when a call is in operation. A hard wire transmitter can be placed on the phone, line, or central telephone system. The transmitter can even be placed on your line outside of the building, or down the street at the junction box.

Radio Frequency (RF), (Spectrum & audio search).

RF transmitters send wireless signals through the air. A FM / AM / Microwave counter surveillance scanner device can then intercept these signals.

With today’s technology, local spy stores and the internet are selling RF transmitters for less than a hundred pounds. This is making it increasingly easy for “interested parties” to place a device in a room and listen to meetings, important company decisions, or discussions about new products or services. A common place is in the personnel department where details of other employees can be learnt.


These types of listening devices operate through a window or similar opening. An operative could easily setup the equipment via tripod connected to a transmitter and intercept your communication from miles away. A laser or infrared beam is shot into the room from any distance of up to many miles away. The audio in that room is picked up by the laser beam and transferred into data that is then sent over the light or infrared beam back to the sender. The sender normally has a recorder connected to the equipment and can record the conversation.