TSCM Sweep Services

A TSCM sweep is a structured counter-surveillance process used to identify covert monitoring risks within physical and hybrid environments.

Unlike informal “bug checks”, a professional TSCM sweep evaluates devices, access, infrastructure, and behaviour to determine whether surveillance is present — and whether it presents real-world risk.

Our TSCM sweeps are conducted discreetly, lawfully, and with evidential clarity.

What a TSCM sweep is designed to detect

A properly conducted TSCM sweep assesses for:

  • Covert audio surveillance (RF, GSM, LTE, IP-based)

  • Hidden or disguised video devices

  • GPS, cellular, and BLE tracking devices

  • Network-connected or power-line-enabled surveillance

  • Residual devices from previous access or occupancy

  • Indicators of insider-assisted placement

Detection is validated and contextualised, not simply flagged.

What makes a TSCM sweep different from a “bug sweep”

A bug sweep focuses narrowly on listening or tracking devices.

A TSCM sweep goes further by assessing:

  • How a device could have been placed

  • What access would have been required

  • Whether infrastructure supports covert monitoring

  • Whether findings represent real operational risk

This distinction matters when decisions have legal, financial, or personal consequences.

When a TSCM sweep is appropriate

Clients typically request a TSCM sweep when:

  • Sensitive discussions or negotiations are planned

  • Confidential information appears to be leaking

  • A property, office, or vehicle has changed hands

  • There are concerns about insider access

  • Legal, media, or reputational exposure is increasing

  • High-risk travel or meetings are imminent

If the question is “could surveillance be present?”, a TSCM sweep is the correct response.

Environments commonly covered

Our TSCM sweeps are conducted in a range of environments, including:

  • Executive offices and boardrooms

  • Residential properties

  • Legal and consultation spaces

  • Temporary accommodation (hotels, serviced apartments)

  • Vehicles and mobile environments

  • Sensitive project or planning spaces

Each sweep is scoped to the specific access history and threat context of the location.

How our TSCM sweep process works

Every sweep follows a structured methodology:

  • Pre-sweep context

    • Threat model

    • Access history

    • Use of space

  • Physical & RF assessment

    • Visual and structural inspection

    • RF spectrum analysis

    • Signal and power anomaly detection

  • Digital & hybrid assessment

    • Network-enabled artefacts

    • Persistent or covert connectivity indicators

  • Validation

    • Elimination of false positives

    • Functional assessment of anomalies

  • Clear reporting

    • What was found

    • What was ruled out

    • What action (if any) is required

Results are explained in plain language, suitable for executive or legal decision-making.

Who this service is for

✔ Executives and senior leadership
✔ Legal teams and dispute cases
✔ High-net-worth individuals
✔ Journalists and investigators
✔ Organisations handling sensitive information

Not suitable for:

  • Consumer reassurance checks

  • DIY scan validation

  • Curiosity-based requests

A TSCM sweep is about risk clarity, not comfort.

Related services

You may also want to review:

Discuss a professional TSCM sweep

If you require discreet, evidence-based counter-surveillance, we can discuss scope and suitability confidentially.

We do not use sales teams or call centres.

If you believe a bug sweep or TSCM inspection may be appropriate, contact us directly to discuss your situation confidentially.

Email: enquiries@cyberdec.co.uk