"The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses."
The GBI team is trained to the same specifications and employs the same techniques used by government agencies. We use state of the art equipment, the OSCOR by REI, a spectrum analyzer, as well as much much more.
We've completed hundreds of sweeps, briefed thousands of personnel and can come to your place of business, perform a vulnerability analysis, and professionally brief your employees, educating your staff about what to look for and how to respond.
Our backgrounds have been vetted by the Federal Government and the State of Minnesota Private Detective and Protective Agent Services Board.
The GBI team has been providing Technical Surveillance Countermeasures (TSCM) services for over 15 years and have, over time and tested experience developed a complete and thorough method for sweeping a space both physically and electronically.
Scanning for RF signals is only one part of an effective TSCM sweep, a physical inspection of ceiling spaces, walls, outlets, IT & TELCO equipment as well as any conditions that may be present due to architectural or production floor features.
We will visit your site to establish the physical construction of your space, the scope of your needs and provide a proposal based upon what we learn.
TSCM is also known by the reference of "Bug Sweeps," and the more modern name of Electronic Eavesdropping Detection or EED.
We are Certified Specialists in the detection and locating of eavesdropping devices. Our Team is trained to the same specifications and utilizes the same equipment and techniques used by federal government.
We use the state of the art OSCOR, an R.F. Spectrum Analyzer, as well as F.L.I.R., telephone and networks analyzers ($100,000).
Safe Room Service
We provide a Safe Room Service, where we come in just prior to your meeting, set up our equipment, both Spectrum Analyzers and Acoustic Noise Generators, conduct a preliminary bug sweep and stay to ensure no information is leaked or broadcasted.
Quarterly TSCM Sweeps
Continuing security and maintenance of your security position requires re-sweeping a location on unannounced regular intervals. Our process marks previously cleared outlets and electrical equipment which dramatically reduces the cost of follow up visits.
Restrain yourself from attempting to find a device yourself, detecting bugs is difficult even for the professionals who specialize in TSCM
A Technical Security Countermeasures (TSCM) sweep is a service provided by highly qualified personnel to detect the presence of surveillance devices and to identify technical security vulnerabilities of the site in question.
GBI uses proven technique & decades experience in Counter-Surveillance & Technical Security Counter Measures (Bug Sweeps) to secure our clients locations
Protection against the installation of eavesdropping devices or "Bugs"require
Report your concerns to the appropriate team member
A Technical Security Countermeasures (TSCM) sweep has several components
A TSCM sweep is very conspicuous, schedule during off hours or weekends
A Technical Security Countermeasures (TSCM) sweep locates and identifies the presence of surveillance devices within a location
A Bug Sweep systematically locates and identifies electronic devices intended to eavesdrop on private communications
The GBI team has over 20 years experience in providing high level TSCM services to corporations facing complicated security concerns.
We protect your confidentiality and ensure that your business remains your business
Experience matters, our team members have been providing TSCM services in Las Vegas for over 20 years.
Our reputation speaks for itself, that is why our team is the most highly recommended TSCM or Bug Sweep service in Las Vegas
The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses