Residential TSCM is a process of locating and neutralizing any electronic devices that may be present in a private home. This can include audio and video transmitters, wiretaps, tracking devices and hidden cameras. TSCM is often used in legal proceedings to protect against possible intrusions by former partners or co-workers or to investigate allegations of electronic surveillance.

The first step in residential TSCM is to conduct a thorough survey of the property to be checked. This involves a physical search and an electronic sweep of all rooms and appliances. Suspected devices will be located and identified.

TSCM is a vital tool in protecting your privacy and safety. If you have any reason to believe that you are under electronic surveillance, it is important to have your home checked by a qualified professional.

The TSCM process typically involves the following steps:

  1. A physical inspection of the premises to look for hidden devices, including using specialized equipment such as a bug detector or camera detector.
  2. A review of all electronic equipment and systems in use on the premises and telecoms systems and security systems.
  3. A review of all communications traffic on the premises, both electronic and oral.
  4. The provision of countermeasures against any detected devices, including the installation of signal jamming devices.
  5. The provision of training for staff on how to recognize and deal with threats from electronic surveillance.

Surveillance Counter Measures (TSCM) Strategy

The benefits of Residential Technical Surveillance Counter Measures (TSCM) are vast and can protect individuals from many different types of invasion of privacy.

Some of the main benefits of TSCM include:

  1. Detection and removal of audio and video transmitters, wiretaps, and tracking devices from homes and vehicles.
  2. Prevention of illegal surveillance by providing a warning that someone may be trying to spy on you.
  3. Assistance in resolving legal disputes by providing concrete evidence that electronic surveillance has taken place.
  4. Protection from disgruntled family members, co-workers, former partners, or would-be heirs.
  5. Peace of mind that your privacy is protected.


Electronic surveillance is not just targeted at high profile people, celebrities and business executives.

Many people believe that electronic surveillance in their own home is out of the realms of possibility.

Private Citizens who are going through legal proceedings, have grudges against them or are leaving unhealthy relationships may require our services. People from all walks of life have unfortunate breakups, relationship issues and business dealings.

We have been called many times to check homes and vehicles for all types of devices including audio transmitters, covertly placed cameras, wiretaps and tracking devices.

Bugs can be placed in your home by co-workers, family members, former partners, would be heirs and investigators misrepresenting themselves. We have seen it.


Find out how we can secure your home and vehicle.

A quick online search will show you a vast array of audio and video equipment designed to secretly record audio and video files that can be streamed using Wi-Fi or cell phone (GSM) technology.

This technology is available to anyone. You do not even need to be tech savvy for implementation though there is no shortage of people who are tech savvy to implement even more sophisticated schemes.

Find out how COMSCAN TSCM can secure your home and vehicle.


We Use the Best TSCM Equipment

We use the best bug sweep equipment available. Key features of effective bug-sweeping tools include the ability to:

  • Detect RF energy emissions.
  • Identify unknown Bluetooth, Wi-Fi, and cellular signals.
  • Hidden microphone detection.
  • Find hidden electronics even when turned off.
  • Evaluate thermal energy from hidden devices.

What you can expect during the sweep:

  • RF Spectrum Analysis of the zone and surrounding area followed by near-field RF detection.
  • 2G, 3G 4G, and 5G Sweep for devices that use cell phone technology
  • Wi-Fi and Bluetooth device surveys
  • Wire tap checks of phones, lines, cables, wall jacks, server rooms and telephone rooms
  • Acoustically stimulated microphone detection
  • A physical search of the designated zone with a bore scope
  • Non-Linear Junction detection for devices in standby mode or powered off.
  • Thermal imaging check for hidden heat signatures
  • Threat Assessment

What Our Clients Say

My company was being spied on by competitors. I knew what they were looking for from outside sources but I did not know how they were going about it. I hired COMSCAN to find out how and where the leaks were originating. Hiring them was a wise decision. Stephen was thorough and knowledgeable.  After discovering a major problem area he continued on in a tenacious manner and found another source of the information leaks. He also provided me with some useful recommendations after he finished.

Thank you so much for taking on our assignment on such short notice. We greatly appreciate your professionalism and the manner in which you handled our requests while you worked!

How Can We Help?

I am interested in:(Required)
MM slash DD slash YYYY