TSCM Providers equipment

Gain peace of mind by using trained operators with the world’s best TSCM equipment.

Recognised TSCM provider equipment manufacturers

There are few world recognised, tried and tested manufacturers of TSCM equipment, and many that are not.

The four main TSCM manufacturers of international renown that have been used by governments worldwide and are considered the best are (in no particular order):

  1. Research Electronic International USA
  2. Shearwater UK
  3. Winkelmann UK
  4. Audiotel international USA

A potential TSCM provider should disclose what equipment they use, if it is not built by the top 4, then don’t bother, and keep looking

You will not see these brands of equipment for sale on eBay unless it is second hand and potentially damaged.

Other companies make specific pieces of equipment that are excellent and well regarded. They may be general electronic specialists, who make equipment that TSCM technician’s use, but not specifically for TSCM use only. Some example of reliable equipment and software are:

  1. Fluke
  2. Keysight (formerly Agilent)
  3. FLIR
  4. Signal hound

99% of TSCM detection equipment found on eBay will only cover approx. 1% of the Radio transmission spectrum.

You can only get peace of mind by using the trained operators with the best equipment. An operator cannot sweep without at least over 150k worth of equipment as a minimum, and also be trained by the manufacturer of the TSCM equipment.

The Equipment

24 GHz range spectrum Analyser.

This item hunts and locates all Radio Frequency signals in the target area.

Telephone and Line Analyser

This item hunts and locates all Radio Frequency signals in the target area.

Non Linear Junction Detector

This NLJD hunts for hidden electronics not transmitting, or that have run out of power

Infra-red Camera

Forward Looking Infra-Red hunts for heat sources from hidden electronics


This is used for inspecting smaller areas like air vents, drains, roofs

Acoustic Amplifier

This is used to amplify any microphones that have been set up in a target area

Inspection tools

These are required to check voltages, pull equipment and fixtures apart for inspection

Questions to ask all TSCM providers

  1. Do they have REI, shearwater, Audiotel or Winkelmann equipment?
  2. Have they been trained with manufacturer in the UK or USA?
  3. Can they prove it they have any training on paper?

Be careful of “Fly-by-nighters” and “Walter Mittys” who claim to have secret government/ armed forces/ police training; especially from overseas. Ask for proof of their job role and skill sets, or forget them. Just because someone was in the Police Force or Armed Forces doesn’t mean they have any specific TSCM training whatsoever.

Does the TSCM provider have at LEAST:

  • A Spectrum Analyser
  • A Non Linear Junction detector
  • A telephone and line Analyser
  • An Infra- Red Camera
  • An RF Sniffer
  • Wi-Fi Network analysis hardware and software
  • VoIP inspection software
  • Physical search inspection tool set

There is not one piece of equipment that can scan everything that has been invented in the world to date. Someone walking around with just a single small box and an antenna is a fraud.

This is just an absolute baseline to conduct a TSCM search, if a person doesn’t have all of these, he is a pretender hoping you don’t know what to look for, and is physically unable to do the job.

TSCM Experience and Training

  • A TSCM operator must be able to prove where and when they were trained
  • Security guards have NO knowledge or training in TSCM in Australia
  • Licenced security risk assessors have no specific TSCM sweep training

What must be undertaken in a comprehensive TSCM sweep?

All Radio frequencies from bug transmissions and accounting for all signals in the area

All phones, phone lines, and IDF, MDF boards

A Physical search in conjunction with:

  • A non-linear junction detector
  • Infra-red camera
  • Borescope

There is no point checking just for transmissions, if you are being recorded by a USB stick or a Dictaphone that doesn’t transmit.

There is no point in checking for transmitting and non-transmitting bugs only; if your phones are bugged, and picking up in room audio as well.


Quickly lock down your operation:

  1. Check backgrounds of all service staff and subcontractors such as cleaners who work unsupervised.
  2. Have all staff to sign water tight confidentiality contracts written by an IP specialist lawyer, and a industrial relations lawyer. Include warnings that they will be prosecuted as a matter of company policy if they are caught stealing data.
  3. Designate a responsible person to ensure that all computer terminals are turned on and off at Master Mains power at the end of the working day. So they cannot be turned on by cleaners etc.
  4. Buy tougher locks to pick such as KABA MAS.
  5. Think of who would be your weakest link that a spy would target e.g. loosest on the phone, messy desk, thinks the regulations do not apply to him/her.
  6. Install an Intruder alarm system with motion detection SMS / email notifications of entry out of hours in high value areas to management.
  7. Put all staff through data safety training, and encourage them to keep an eye out for warning signs, and other staff privacy regulation breakages.
  8. Have a risk assessment conducted by a qualified security risk assessor to find any and all gaps in your business’s security, and implement the recommendations to close the gaps.
  9. Create a security informed and aware culture in the business.
  10. Immediately respond to negative workers.

Most importantly: get your place swept by a competent TSCM technician to find out if you are being electronically attacked

New IT security Company policy:

  1. No USB sticks in the office except those provided by management with Identifiers.
  2. All company paper must be shredded onsite by the end of the day.
  3. All confidential information must be stored in a designated locked storage area.
  4. Passwords must be changed every 4 weeks.
  5. Computers must be set to sleep after 15minutes of inactivity.
  6. Computers must be logged off at all breaks and when away from the computer.
  7. No access to personal email, social media or personal phones inside work times or premises.
  8. Staff will be instantly dismissed for using another staff member’s computer, laptop, mobile device, desk phone or mobile phone without permission from their manager.
  9. All employees who are leaving will be closed off from accessing or removing company data once they have left.
  10. Enforce all staff to have a Clear desk at the end of their shift, and lock up all sensitive information.

Jobs for your IT Security Specialist

  1. Encrypt all sensitive electronic data immediately.
  2. Secure all your computer network, data and communications.
  3. Install an industrial grade firewall and virus scanner.
  4. Get your computer network to be able to log, monitor and audit employee online activity.
  5. Lock off sensitive data access with limited access to only those who have need of it, by department e.g. accounting/ marketing/ production/ sales.
  6. Have a secure data backup and recovery process.