Specialised Support & Services
TSCM / Bug Sweeping
We offer expert advice on strategies and perform thorough inspections and live monitoring to detect any audio or video eavesdropping on buildings, vehicles, aircraft and more. Our unique equipment and methods make our services the most advanced in the field.
View ServiceCyber TSCM
We conduct globally unique inspections to identify all forms of eavesdropping attacks on IT systems, data centres or cyber networks. No other provider can fully deliver this service as it requires specialist equipment, software and methods exclusive to QCC.
View ServiceDigital Forensics
We provide a full suite of digital forensic services to assist government, police and corporate investigators with imaging and analysis of any computer, drone or other digital media including, reporting, statements and expert witness testimony for court or tribunal.
View ServiceMobile Phone Forensics
We provide a full suite of digital forensic services to assist government, police and corporate investigators with acquisition and analysis of mobile phone or tablet computers including, reporting, statements and expert witness testimony for court or tribunal.
View ServicePenetration Testing
We provide a full set of Penetration Testing services including cyber, physical and social engineering testing. Testing is followed by a comprehensive report detailing vulnerability findings and coinciding recommendations of remediation.
View ServiceSecure Communications
We advise on and can provide a full range of solutions to achieve secure communications via mobile phone, SMS, land line, Fax, email, webmail, and video conferencing. We also advise on and provide secure rooms, secure skiffs and secure containers.
View ServiceProtective Security
We advise clients on and diligently offer a comprehensive range of protective security measures, including counterintelligence window film, to minimise the risk of eavesdropping, information loss, security incidents, and unauthorised intrusion.
View ServiceTSCM Training
We train government TSCM teams how to conduct inspections of buildings, vehicles, aircraft and watercraft using any combination of TSCM equipment. QCC then delivers top up training to keep teams current with the latest emerging bugging threats.
View ServiceTSCM Equipment
We provide independent procurement advice on selecting the right TSCM equipment to meet clients' exact needs, ensuring they choose the best combination. Clients can purchase all recommended equipment through QCC for a streamlined procurement process.
View ServiceAdd Your Heading Text Here
Growing Demand for TSCM / Bug Sweeping & Digital Forensics
Companies, Governments and Individuals are increasingly coming under attack from an ever widening array of complex threats including audio & data eavesdropping / bugging devices, hacking, information theft, fraud and Cybercrime.
Advances in technologies like 4G / 5G and Wi-Fi / Bluetooth provide endless options for eavesdroppers, information thieves & criminals.
To counter these threats and protect our clients, QCC has developed the world’s largest and most advanced commercial TSCM and Cyber TSCM capability backed up by our digital forensics and mobile phone forensics laboratories.
Our Track Record
Years
Reducing Client risk exposure globally for over 25 years.
Countries
Globally trusted, delivering solutions in over 105 countries.
Operations
Over 6,000 successfully completed Client operations.
Add Your Heading Text Here
Frequently Asked Questions
What is TSCM or Bug Sweeping?
TSCM (sometimes referred to as Bug Sweeping) is the acronym which stands for ‘Technical Surveillance Counter Measures’. TSCM is the process and science of protecting a target location / person(s) / communications / discussions / data from eavesdropping.
How much bugging and unauthorised surveillance occurs?
The covert nature of unauthorised surveillance and bugging makes predicting the scale quite difficult. A successful covert surveillance operation if executed correctly will leave no trace of the activity having taken place.
A survey, based on feedback from over 500 clients from various sectors, shows a high increase in losses arising from information theft and financial fraud. It’s worth noting that whilst 80% of respondents acknowledged losses, only 44% could quantify or identify the source of the loss. In many cases, electronic eavesdropping and technical attack would have been used to steal information.
Where do spies hide bugs?
Offices, boardrooms, internal telephone systems, mobile phones and computers are the places where most people believe that bugs might be concealed by hostile operatives looking to steal secrets.
However it is clear to industry insiders that eavesdropping is not confined to offices alone. In fact canny spies are liable to gather data in a wide range of other locations. Anywhere that a target goes, the spies are likely to follow. Listening devices are so small, light and easy to conceal that they can be put almost anywhere.
Standards & Memberships
Our Articles
Soviet Spies Bugged World’s First Electronic Typewriters
Keystroke loggers, which secretly record key presses on a computer keyboard, are today's…
Eavesdropping Devices Found in Restaurant
Police investigators believe two eavesdropping devices found inside a Europort restaurant, placed on…
Is Your Smart TV Remote Listening to You?
Security researchers at Guardicore recently discovered a flaw in the firmware of a…