Howe Law Firm
  • Events
  • Locations
  • Blog
  • FAQs
  • Resources
  • About
  • Case Types
  • Contact Us
  • English
  • My account

search

 

phone

(800) 348-4698

Menu
  • Home
  • e-Discovery and Forensics
    • Mobile Phone Evidence
      • Text Messages
      • Phone Metadata
      • Voicemails
      • Phone Call Logs
      • Contacts
      • GPS & Locations
      • Phone Internet History
      • Phone Bookmarks
      • Close
    • Tablet Forensics
      • iPads
      • Android
      • Close
    • Email Evidence
    • Computer Evidence
      • Backups
      • Computer and Smartphone Forensics
      • Computer File Types
      • Computer Internet History
      • Computer Log Files
      • Computer Metadata
      • Computer Web Bookmarks
      • Google Docs & Sheets
      • Mac Computers
      • Photos & Images
      • Servers
      • Videos
      • Virtual Machine and eDiscovery Forensics in Litigation
      • Windows Computers
      • Word, Excel, PDF files
      • Close
    • Social Media Evidence
    • Online Cloud Evidence
    • Database Evidence
    • Website Evidence
      • Search Technologies
      • Close
    • Legal Review Platform
    • Close
  • Remote Collection
  • Expert Services
    • Expert Witness
    • Joint (Neutral) Expert
    • Special Master
    • Database Expert Witness
    • Litigation Response Plan
    • Discovery Protocols
    • Discovery Requests & Pleading Preparation
    • Document Review
    • Trial Presentation Exhibits
    • e-Discovery Legal Consulting
    • Asset and Background Reports
    • Digital Asset Recovery after Death
    • Close
  • Counter Surveillance
    • Quote
    • FAQs
    • Home Bug Sweep
    • Home Router Hacking Detection
    • Business Bug Sweep
    • Vehicle Bug Sweep
    • Phone Spyware and Hacking Detection
    • Computer Spyware and Hacking Detection
    • Email Spying and Hacking
    • Social Media Spying and Hacking
    • Online Account Spying and Hacking
    • Conference Rooms
    • Boat Bug Sweep
    • Airplane Bug Sweep
    • Personal Items
    • Signs of Surveillance
    • Cyber Security & Cyber Forensics
    • TSCM Equipment
    • Close
  • Shop
      • Home under video surveillanceHome Bug Sweep Services Cost
      • internet router malware and hacking analysisHome Router Analysis Cost
      • business router analyzed for hackingBusiness Router Analysis Cost
      • business conference room under video surveillanceBusiness Bug Sweep Services Cost
      • white compact suv and gps trackerVehicle Bug Sweep Cost
      • cell phone being analyzed for spyware malware and hackingPhone Spyware & Hacking Detection Cost
      • ipad tablet being analyzed for spyware malware and hackingiPad/Tablet Spyware & Hacking Detection Cost
      • computer being analyzed for spyware malware and hackingComputer PC/Mac Spyware & Hacking Detection Cost
      • email account being analyzed for spyware malware and hackingEmail Account Analysis Cost
      • woman on phone with social media account bubbles floating in front of her and being analyzed for spyware malware and hackingSocial Media Account Analysis Cost
      • screenshot of login page to online account to evaluate for spyware, malware, and hackingOnline Account Analysis Cost
      • luxury boat under video surveillanceBoat Bug Sweep Services Cost
      • private jet under video surveillanceAirplane Bug Sweep Services Cost
      • yellow external hard drive with threat of spyware, malware, and hackingExternal Hard Drive Analysis Cost
      • red and blue usb thumb drives plugged into computer with threat of spyware, malware, and hackingThumb/SD Drive Analysis Cost
    • Close
  • Fees
  • Order
    • New Client Form
    • Email Evidence Report
    • Facebook Evidence Report
    • Remote Collection Unit
    • Person Asset and Background Report
    • Business Asset and Background Report
    • Close

Can I get an online quote for a bug sweep and check my phone and computer for spying?

Yes, click here to use our free online Fee Calculator.

What is the cost to check my electronic devices for spying and hacking?

In addition to bug sweeps of your physical spaces, we perform electronic surveillance detection of any electronic device or online account.
*          Computer $575
*          Router $575
*          Online Account $575
*          For additional information, see all flat-fees here

Our flat fees are all-inclusive – the bug sweep costs we quote you are all you pay. You do not pay extra for travel, phone calls, or emails. Following our bug sweep with a free written report of our findings and recommendations.

What is TSCM?

TSCM stands for Technical Surveillance Countermeasures. Generally, it includes counter surveillance bug sweeps, identifies security vulnerabilities, and can also include recommendations to increase your security.

Do you charge for travel expenses?

No. Our fees are flat-fees and based on the size of the premises, and the number of electronic devices and accounts to be analyzed. We will not charge separately for travel, our time (emails and phone calls), and the final report. See all of our flat-fee services here.

What kind of TSCM or counter surveillance equipment do you use in a bug sweep?

We use a variety of equipment and techniques to do a thorough bug sweep or TSCM sweep. This includes:
• Advanced near-field detection receiver (including RF detector) to scan for and locate various types of eavesdropping devices (including microphones and cameras) across the frequency spectrum from 10 kHz to 12 GHz.
• Non-Linear Junction Detector to detect electronic semi-conductor components in walls, floors, ceilings, fixtures, furniture, containers, or other surfaces. This includes detecting and locating hidden cameras, microphones, and other electronic devices regardless of whether the surveillance device is radiating, hard-wired, or turned off.
• Spectrum Analyzer to detect known, unknown, illegal, disruptive, or interfering transmissions throughout a wide frequency range up to 12 GHz.
• Testing equipment to discover very low frequency (VLF) through carrier current (electrical transmissions).
• Electrical and Magnetic signal detection.
• Thermal imaging device with forward-looking infrared radar (FLIR) to identify infrared (IR) and heat signatures of electronic devices on, near or within ceilings, walls, floors, vents, furniture, artwork, clothing, lights, switches, personal property, and electronic equipment on the premises.
• Search for voice recordings with parabolic microphones through windows. Check RF attenuation for free passage for RF signal through the windows.
• Use a drone to search for surveillance cameras, microphones, and antennas on the outside of homes and office buildings.

  • 1
  • 2
  • 3
  • Next Page »
  • Home
  • Services
  • Fees
  • Case Types
  • Events
  • FAQs
  • Links
  • Blog
  • About Us
  • Contact
  • Account details
  • 0 items$0.00

Copyright © 2023

Howe Law Firm
Main (503) 227-6660
Howe@HoweLawFirm.com
Pay Your Invoice Securely with LawPay
  • Albuquerque
  • Anaheim
  • Atlanta
  • Bakersfield
  • Baltimore
  • Boise
  • Boston
  • Chicago
  • Columbus
  • Dallas
  • Denver
  • Detroit
  • El Paso
  • Fort Worth
  • Fresno
  • Houston
  • Irvine
  • Jacksonville
  • Kansas City
  • Las Vegas
  • Long Beach
  • Los Angeles
  • Memphis
  • Miami
  • Milwaukee
  • Minneapolis
  • New York
  • Oakland
  • Orlando
  • Philadelphia
  • Phoenix
  • Pittsburgh
  • Portland
  • Reno
  • Riverside
  • Sacramento
  • San Antonio
  • San Diego
  • San Francisco
  • San Jose
  • Santa Ana
  • Santa Rosa
  • Seattle
  • Spokane
  • St. Louis
  • Stockton
  • Tacoma
  • Tampa
  • Tucson
  • Vancouver
  • Washington DC
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter
  • YouTube
Copyright © 2018, HoweLawFirm.com. All Rights Reserved | Privacy Statement | Terms Of Use