Technical SURVEILLANCE
CounterMeasures
Nationwide Professional Counter-Espionage Services.
Discreet, Trusted, and Professional.
Blackfish Intelligence leverages highly skilled specialists, using the most advanced Technical Surveillance Countermeasures (TSCM) equipment to protect your sensitive communications and information. Our services, commonly known as bug sweeps, bug sweeping, and technical security sweeps, are designed to detect and eliminate hidden surveillance threats.
Is Your Information Secure?
Confidential conversations are fundamental to privacy, and maintaining privacy is a business, legal and personal imperative!
Violations of privacy through electronic eavesdropping, hidden cameras, wiretaps, and other surveillance devices are on the rise and getting more technologically sophisticated. These violations, accomplished via electronic eavesdropping or "bugs" leave you exposed and vulnerable. From insider threats to industrial espionage, you or your organization can risk legal exposure and ultimately, very costly consequences. An adversary can gain access to trade secrets, proprietary advancements, corporate strategy, marketings plan, customer information, etc. that can cripple your company's profitability, garner negative media attention, or destroy brand reputation.
Why Choose Blackfish Intelligence?
Blackfish Intelligence is the leading professional TSCM company, providing Technical Surveillance Countermeasures, counter surveillance inspections, and TSCM sweeps to clients across the United States.
We offer TSCM services to government, corporations, non-profits, residents, and other high-profile clients requiring bug sweep services and electronic surveillance detection. Blackfish Intelligence and our Senior Technicians have over 40 years of experience in the TSCM field, continually evaluating the threat landscape and learning of new emerging threats. We are dedicated to excellence, professionalism, and investment in cutting-edge technology.
Security Matters
Our Technical Surveillance Countermeasures (TSCM) services include a full range of bug sweeps, technical security sweeps, and counter-surveillance inspections, including:
-
Corporate Boardroom Sweeps
-
Bug Sweeps of C-Suite Offices
-
Sweeps of Law Offices and Conference Rooms
-
Off-Site Meeting Sweeps of hotel rooms, conference rooms, and break-out rooms
-
Executive Residential bug sweeps
-
Executive Vehicle bug sweeps
-
Radio Frequency Mapping and real-time Live Monitoring of Board meetings or other Executive Meetings
-
Residential and Vehicle TSCM Sweeps
In these moments, information exposure can impact legal position, valuation, leverage, and personal safety.

Stop the spying
Take the Appropriate Steps
Detection
Our TSCM services are very detailed and designed to detect, locate and mitigate the risk and threat from technical eavesdropping devices. TSCM services also identify security vulnerabilities and countermeasures to prevent future attacks. Utilizing the highest grade of technology and expert technical operators we evaluate the project scope, RF Map the project, identify risks, and utilize technology and methods to identify and locate threats.
Mitigation
Once surveillance devices are identified, we issue a full report of our findings, technology used, and recommendations to prevent and reduce risk of future events. If a surveillance device is found, we offer a wide range of options that the client may take including removal, further investigation, or coordinating with state or federal law enforcement, or to support civil litigation if the culprits can be identified.
Prevention
Beyond TSCM sweeps, we provide our clients with risk assessments, a review of existing countermeasure programs, review physical security processes, and capture and record Radio Frequency (RF) baselines for comparison purposes at the next TSCM sweep. Moreover, Blackfish Intelligence personnel provide education on best security practices, implement robust access controls, and regularly conduct security assessments to identify vulnerabilities.
TSCM REMOTE MONITORING
During a TSCM sweep, all RF signals are captured, forming the RF landscape for a targeted area. If the client subsequently identifies a conference room or other room for live remote monitoring, we use spectrum analyzers to compare the real-time RF signals with the previously established RF landscape while the meeting /conference is taking place. Through this comparison, suspicious RF signals can be immediately detected and analyzed .
Education
We believe that knowledge is the first line of defense against surveillance threats. Our platform offers comprehensive resources, including articles, guides, and tutorials, to empower individuals and organizations with the knowledge and skills needed to protect their privacy and security effectively.
SUPPORT VIA Expert Testimony
Through documentation and preservation of evidence as the basis for legal proceedings and criminal prosecution, our seasoned experts deliver compelling testimony based on meticulous TSCM analysis, articulating complex technical concepts and bolstering prosecution arguments in court.
Frequently asked questions
What are Technical Surveillance Countermeasures (TSCM)?
Technical Surveillance Countermeasures (TSCM) refers to the process of detecting, identifying, and neutralizing electronic surveillance threats. Often called bug sweeps or bug sweeping services, TSCM inspections are designed to uncover hidden cameras, wiretaps, GPS trackers, and other devices used for electronic eavesdropping. These technical security sweeps combine advanced equipment and expert analysis to ensure your environment is secure.
Why should I consider a TSCM sweep?
A TSCM sweep, also known as a bug sweep or counter surveillance inspection, is essential when sensitive information is at risk. Businesses, executives, law firms, and even individuals often have TSCM inspections conducted before high-stakes meetings, during legal disputes, or when they suspect surveillance. These sweeps help detect unauthorized monitoring, prevent data breaches, and protect against electronic eavesdropping, hidden cameras, and wiretap threats.
What is electronic eavesdropping?
Electronic eavesdropping is the unauthorized interception of private communications using surveillance devices such as hidden microphones, wiretaps, or concealed cameras. These threats are often difficult to detect without specialized equipment. TSCM inspections and technical security sweeps are used to locate and eliminate these devices, helping to protect sensitive conversations and information.
What types of devices can TSCM detect?
Professional TSCM services are designed to detect a wide range of surveillance threats, including:
- Hidden cameras
- Audio listening devices (“bugs”)
- Wiretaps
- GPS tracking devices
- RF transmitters used for electronic eavesdropping
Advanced bug sweeping and de-bugging techniques allow specialists to identify both active and passive surveillance devices.
How often should TSCM sweeps be conducted?
The frequency of TSCM sweeps depends on your risk level. High-risk environments—such as executive offices, legal settings, or sensitive meeting spaces—may require regular technical security sweeps or inspections before important events. Routine bug sweeps help maintain ongoing protection against evolving surveillance threats.