Protect your Privacy with Bug Sweep Services
We help protect your privacy (including attorney-client communications) by searching for spyware, trojans, viruses, and rootkits on mobile phones (iPhones and Androids) and computers (PC and Mac). Using specialized equipment, we also provide bug sweep services to detect hidden cameras and microphones in homes, offices, conference rooms, and vehicles.
Counter Surveillance – Cybersecurity – Bug Sweep – TSCM
Howe Law Firm performs counter surveillance services for both companies and individuals, looking for and removing any surveillance devices that may be present.
We begin with an interview so that we can determine your exact needs and concerns. We conduct bug sweep services in a variety of places and objects, including:
- Home Office
- Car or other Vehicle
- Computer (PC or Mac)
- Cell Phone (iPhone, Android, Blackberry)
- Computer Router
Using up-to-date technology and techniques, we detect hidden cameras and microphones in many forms, such as:
- Wire and microphone taps
- Wireless transmitters
- Phone taps
- Radiofrequency (RF) bugs
- Ultrasonic bugs
- Pinhole cameras
- Wireless cameras
- Infrared surveillance devices
- Carrier current bugs
- GPS trackers
- Computer spyware
Our Bug Sweep Services
A standard bug sweep, or TSCM (Technical Surveillance Counter Measures) inspection, involves several different steps. Initially, we will carry out a thorough inspection of all requested areas. Within the selected areas, we will inspect the walls, electrical fixtures and outlets, and windows, as well as any items such as lamps, or furniture, all of which are capable of hiding microphones or cameras.
Here are some of the services we perform:
- A “silent sweep,” which can find surveillance devices while they’re in operation.
- An RF spectrum analysis, which checks for radio and telephone transmitters.
- Inspection of power lines.
- Electronic and physical inspections of phones and phone lines.
- A physical search of the premises.
If you suspect surveillance, look around for common signs of surveillance.
Home Counter Surveillance Services
Perhaps the greatest violation is a breach of security and privacy of your own home. Our comprehensive bug-sweep services for your house, condo, or apartment restore peace of mind.
Detect and Remove Video and Microphones Surveillance
Business surveillance is no longer limited to just the largest of corporations, rather, smaller family businesses are increasingly subject to spying. We bug sweep offices, conference rooms, and analyze business routers and more to uncover covert surveillance.
Business Office Counter Surveillance Services
We do conference room bug sweeps as regularly as you want to ensure that what’s said in the conference room, stays in the conference room.
Conference Room Counter Surveillance Services
Vehicle surveillance as a tool is no longer limited to law enforcement. Increasingly, private individuals are using equipment attached to cars, trucks, and SUVs to track their partners, employees, and others.
Vehicle Counter Surveillance Services
Our bug sweep services and counter-surveillance techniques detect when you are being spied on through either your cell phone or landline.
Are you being stalked through your smartphone?
Personal and business computers can be used as a vehicle for surveillance in your home or office. Whether surveillance is being used to hack into your computer camera, microphone, or just track all your electronic movements, we can help identify and end unwanted surveillance.
Detect and Remove Computer Spyware
When doing a bug sweep of a home or office, we recommend and use router analysis to detect surveillance. As computer forensic experts, we check all the settings on your router to make sure your router is secure and determine whether or not there has been any exploits or surveillance.
Is Your Computer Router Being Used to Spy on You?
If you suspect your email accounts are being used to spy on you and watch your communications, let our counter surveillance experts analyze your accounts to identify and help you end the spying.
Detect and Remove Spyware on Email
If you suspect your social media accounts are being used to spy on you and watch your communications and movements, let our counter surveillance experts analyze your accounts to identify and help you end the spying.
Is someone spying on your social media accounts
If you suspect your online accounts are being used to spy on you and watch your communications and other online activity, let our counter surveillance experts analyze your accounts to identify and help you end the spying.
Eavesdropping and Spying on Online Account
Electronic surveillance detection of listening devices, cameras, and GPS tracking ($100 per foot with a minimum of $1,975).
TSCM Counter Surveillance and Bug Sweep Services
When you order a physical sweep of a business, home, or vehicle, we bug sweep personal items and household items at no additional cost.
Personal Items in a Bug Sweep
What Happens when we Complete the Bug Sweep?
We will give you both a verbal and written report summarizing our findings once we complete the inspection. Additionally, we advise you on how to proceed, including the removal of spy devices and how to prevent future eavesdropping in the event we detect any surveillance devices.
When we Detect Hidden Microphones and Cameras
Should we detect surveillance equipment, we can then suggest a suitable course of action to eliminate the intrusion into your privacy. This usually includes removing the surveillance equipment and detailing measures to prevent surveillance from re-occurring. Some clients choose to notify the authorities or even delay removing a device in order to provide misinformation.
Please note that we do not sell any surveillance or counter-surveillance equipment, and we do not install surveillance devices. We conduct counter-surveillance detection and device removal services only.
How It Works
We start quickly, in just 3-steps, as soon as you call us.
- Contact us at (503) 227-6660 to discuss your needs. We will explain to you how the counter-surveillance and bug-detection operation works so that you know what to expect.
- You determine what locations (such as home or business) and property (vehicles, computers, cell phones) need to be inspected.
- On the agreed date, we will complete the counter-surveillance work.
It’s as simple as that. Let us get started helping you address your surveillance concerns with our fast and effective services.