header logo-eye



..hElping to prevent audio and leakage.


About Us


We are very passionate about privacy and diligently keeping abreast of the latest and innovative ways that can threaten privacy. Many of which are regularly being made available in the public domain allowing others to duplicate with little knowledge, skill, resources or finance. When we find such threats we build a proof-of-concept device which gives us a unique perspective into the risk associated to the threat. 


The technology threat..


The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.


Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver and a spectrum analyser. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively.


SDR’s, Software Define Radios and the circuitry they use have become very affordable over the past few years, something which was previously only available to the military, and with point-and-click software to operate them, we are seeing emerging a new era bringing new threats, risks and vulnerabilities being used for purpose of industrial espionage, eavesdropping and spying. For example, an IMSI Catcher, used for intercepting mobile phones by acting as rough cell tower, previously was only available to government departments and costing $250,000 +, can now be built for under $5000 using SDR’s.


Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect. There are a number of options for detecting such bugs. Very sensitive equipment can be used to look for magnetic fields, or for the characteristic electrical noise emitted by the computerised technology in digital tape recorders. If the place being monitored has many computers, photocopiers or other pieces of electrical equipment installed, it may become very difficult to locate bugs. Items such as audio recorders can also be very difficult to detect using electronic equipment. This is why TCSM is important, the process and equipment used are designed to locate the harder to find devicies.

header logo-eye


TSCM (Technical Surveillance Countermeasures) is the abbreviation denoting the process of bug-sweeping or electronic counter-surveillance. It is related to ELINT, SIGINT and electronic countermeasures (ECM).