Counter-Surveillance Sweep Services

A counter-surveillance sweep is appropriate when the concern is not a specific device — but the possibility of being observed, monitored, or tracked.

Unlike basic bug checks, counter-surveillance focuses on patterns, access, anomalies, and intent, not just hardware detection.

Our counter-surveillance sweeps are designed to establish whether surveillance is possible, probable, or unlikely, and what that means in real-world terms.

What a counter-surveillance sweep addresses

Counter-surveillance is about answering three questions:

  1. Could surveillance exist in this environment?

  2. How would it realistically be conducted?

  3. Does anything present represent actionable risk?

To do this, we assess for:

  • Indicators of covert observation or monitoring

  • Environmental anomalies inconsistent with normal use

  • Surveillance-enabling infrastructure or access

  • Tracking or location awareness risks

  • Insider-assisted or opportunistic placement scenarios

This approach prioritises intent and feasibility, not assumptions.

How this differs from a bug sweep or TSCM sweep

A counter-surveillance sweep is behaviour- and context-led.

  • A bug sweep looks for specific listening or tracking devices

  • A TSCM sweep assesses devices, infrastructure, and hybrid risks

  • A counter-surveillance sweep asks whether surveillance activity could realistically be occurring — and why

It is often the starting point when concerns are vague, emerging, or evolving.

When a counter-surveillance sweep is appropriate

Clients typically request counter-surveillance when:

  • They feel observed but cannot identify a cause

  • Information appears to be known unexpectedly

  • Behaviour or timing of third parties raises concern

  • There has been recent conflict, litigation, or media exposure

  • Insider access cannot be ruled out

  • Travel, meetings, or decisions carry heightened risk

If the concern is situational, not technical, this is the correct service.

Environments commonly assessed

Counter-surveillance sweeps are conducted in:

  • Executive offices and meeting spaces

  • Residential properties

  • Legal consultation rooms

  • Temporary accommodation (hotels, serviced apartments)

  • Vehicles and travel environments

  • Project-specific or short-term locations

Each assessment is scoped to how the environment is actually used, not just how it appears.

How our counter-surveillance process works

  • Contextual briefing

    • What prompted concern

    • Who has had access

    • What decisions or activity are sensitive

  • Environmental assessment

    • Visual and structural review

    • Access and placement feasibility

    • Behavioural and pattern analysis

  • Targeted technical checks

    • RF and signal assessment (where appropriate)

    • Tracking and proximity risk indicators

  • Correlation and validation

    • Elimination of benign explanations

    • Risk grading based on evidence

  • Clear explanation

    • Whether surveillance is likely, possible, or unlikely

    • What matters next

    • What does not require action

The outcome is clarity, not escalation.

Who this service is for

✔ Executives and decision-makers
✔ Legal and dispute-involved individuals
✔ Journalists and investigators
✔ High-net-worth individuals
✔ Organisations facing uncertainty or pressure

Not suitable for:

  • Consumer reassurance checks

  • Curiosity-driven requests

  • Situations requiring only a device scan

This service is about situational awareness and confidence.

Relationship to other services

A counter-surveillance sweep may lead to:

  • A TSCM sweep if technical risk is identified

  • A bug sweep if device-specific indicators emerge

  • No further action if concerns are ruled out

We advise proportionately — not defensively.

Related services

You may also wish to review:

Discuss a counter-surveillance assessment

If you’re concerned about covert monitoring but unsure what’s required, we can discuss your situation confidentially and advise appropriately.

We do not use sales teams or call centres.

If you believe a bug sweep or TSCM inspection may be appropriate, contact us directly to discuss your situation confidentially.

Email: enquiries@cyberdec.co.uk