Sweep Team

Sweep Team offers “Electronic Eavesdropping Detection Service” to combat the epidemic of illegal eavesdropping facing the industry today. Sweep Team provides TSCM ( Technical Surveillance Countermeasures) services on a one time, periodic or contractual inspection basis. Our offices are in Florida, Fort Lauderdale and Miami but we service a wide range of corporate and individual clients throughout the United States, Europe, and South America. If you feel you have been targeted by information thieves and in need of an electronic bug sweep, please call us from an off premise telephone! SWEEP TEAM is available anytime to discuss in full confidence any information or security problem you may have or may “think ” you have. We are totally familiar with the threats and clandestine activities going on in the world today.

Technical Surveillance Countermeasures (TSCM) is a counterintelligence activity and refers to the countermeasures that are employed to detect, defeat or nullify attempts to gain any information, whether proprietary, privileged, or confidential or of a very personal nature through the use of a variety of electronic eavesdropping, recording, and other listening and transmitting devices.

Technical Surveillance Countermeasures services require a combination of skills and specialized knowledge about electronics, counterintelligence, countermeasures, physical security, investigations and many other disciplines, all in an attempt to prevent the gathering of information from a subject without that entities knowledge.

Technical Surveillance Countermeasures is conducted to varying degrees within Governments, the commercial and corporate sectors and increasingly included on a domestic level for high net worth, high profile individuals.

Technical Surveillance Countermeasures sometimes referred to as TSCM, “debugging” or “sweeping” detects the presence and location of active/passive eavesdropping and other surveillance devices. It also detects and identifies existing or potential information security and other communications vulnerabilities.