Your browser version is outdated. We recommend that you update your browser to the latest version.

Equipment collage1.jpg (11464 bytes) 

Equipment & Resources

Proper equipment is critical to the performance and results of TSCM sweeps. Gadgetry from spy shops and other low market security sources usually can't detect much of anything. You stand a better chance of finding a bug with a flashlight and a screw driver than with the gadgets you can buy from on-line catalogs and other retail sources.


utilizes the best equipment available and utilizes it to its fullest extent. Nearly 30 years of TSCM experience has given us the expertise to know what equipment works well and what is smoke and mirrors. Years of specialization also gives us the experience to know which technologies will work in what situation and which will yield questionable results. We thoroughly understand the systems we are testing and the equipment we use. We know the results we expect to achieve and know when something is a bit out of kilter, indicating that more investigation is necessary.  Most importantly, we are fully aware of what any specific piece of equipment won't do; we know the limitations of the testing capabilities of all of our gear. Any good technician will know how to fall back on other testing methods and techniques to overcome limitations inherent in any piece of gear.

Our instrument and equipment inventory includes top level products from major TSCM equipment manufacturers, electronic instrumentation suppliers, and other sources. This page will give you an overview of the tools we will use if we work at your facility.

Equipment & Techniques

Radio Frequency Transmitter Detection

We use a computer controlled RF spectrum analyzer ecr2receiver.gif (4829 bytes)with frequency coverage from 20 kHz to 12 GHz. Besides using traditional and standard RF transmitter identification techniques, special signal analysis techniques allow us to identify and locate difficult to detect digital transmitters and a host of other exotic modulation techniques. Click on the picture for more information on our RF detection equipment capabilities.  from a telephone


Telephone Testing Techniques

eta3a.gif (6955 bytes)Using telephone analyzers and other test instruments, we thoroughly evaluate all telephone instruments and lines for a wide variety of eavesdropping devices. Additional techniques let us detect and locate telephone taps located on cabling outside of the facility or premises. Nearly thirty years of experience testing in a PBX environment have taught us the real problems in protecting telephone switches from subtle manipulation for eavesdropping purposes. Click on the picture for more information on our Telephone Tap detection equipment capabilities.


Physical Inspection Techniques

njd5.gif (4831 bytes) We use nonlinear junction detectors on all sweeps to detect hidden electronic devices. Nonlinear Junction Detectors locate semiconductor components used in eavesdropping devices. Detectable devices include voice, pressure, and timer activated radio transmitters, hardwired electret microphones, tape recorders and infrared transmitters, to name a few. These all can be detected even if they are not operating at the time of the sweep. Click on the picture for more information on our passive device detection equipment capabilities.

Imager Sample.jpg (2982 bytes)We also utilize Infrared Thermography to detect the heat signatures emitted by hidden operating eavesdropping devices. This remarkable new application of a proven technology make a sweep even more thorough.  Click on the picture for more information on our thermal imaging capabilities.

We utilize CCTV chip cameras to see into inaccessible areas to visually locate eavesdropping devices that are carefully hidden. Our cameras also detect infrared energy and will find Infra Red transmitters. Our cameras are equipped with IR light sources to illuminate dark areas.

Other equipment includes line amplifiers to detect room audio carried by building wiring and sensitive contact microphones to detect audio carried by structural building components and through ceiling areas and duct work. Cable and wire tracing products assist in the location and identification of telephone, fax and LAN wiring in the survey area.


Non-electronic Vulnerabilities
Regardless of the situation that sparked the need for a TSCM survey, one of the most important aspects of a sweep is an assessment of non-electronic vulnerabilities.

During a survey, we assess the office environment and audit the facility for a variety of non-electronic methods by which information can be stolen. Identification of non-electronic vulnerabilities to information gathering includes, but is never limited to, document security assessments, document destruction machinery adequacy, intrusion detection and access control system equipment operation and procedures, employee and contract personnel access, physical security review, employee awareness, board room and conference room AV system vulnerability analysis, as well as vulnerabilities to visual surveillance of critical areas and general information protection overviews.


If you would like to discuss in complete confidence how our services can prevent losses in your business, please call or email.


As always, do not contact us from a telephone in the suspected area. Don't show your hand to the bad guys.