If you are dealing with an active incident — call us now. We monitor this line continuously.
Active Incident Line

TSCM & Bug Sweeping

Protecting the confidentiality of your conversations, meetings and decisions.
Man in a dark suit with a tie standing behind glass panels and concrete beams in an urban setting.

Technical Surveillance Counter-Measures for corporate, residential and maritime environments. Structured detection, documented assurance, complete discretion.

The room looks clean. The meeting happened in a space you use every week. Nobody new was in the building. The conversation that followed still turned up somewhere it should not have. Technical Surveillance Counter-Measures exists for exactly this: the moment when clean-looking is no longer enough.

Technical Surveillance Counter-Measures (TSCM), sometimes called bug sweeping, is the structured process of detecting, identifying and addressing electronic eavesdropping threats. For organisations and individuals handling genuinely sensitive information, TSCM is an ongoing discipline that protects the integrity of your most important environments.
clients

Who we work with

Blurred silhouette of a businessperson walking and talking on a phone beside a tiled urban building.
Corporate and Transactions
Strategic discussions, M&A activity, data rooms and sensitive board processes. Surveys timed to transaction milestones, board cycles and critical decision points, from initial approach through to completion.
Law Firms and Legal Counsel
Matters where privileged communications must remain privileged. Survey reports documented to support legal proceedings and professional obligations.
Family Offices and UHNW Principals
Residences, vehicles, yachts and travel. Discreet, scheduled surveys for clients whose personal and professional lives demand the same standard of protection.
Maritime Clients
Environments where access control is complex and surveillance risk is elevated. Vessel surveys covering cabins, meeting spaces, communications infrastructure and shoreside facilities.
Event Organisers
High-profile convenings, investor summits and executive retreats. Pre-event surveys of venues, breakout spaces and technical infrastructure.
Modern building corner with dark, reflective metal panels and concrete pavement.
Security Assessment

What you receive

A Grey Prism TSCM engagement tells you exactly what the threat picture is in your environment.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Comprehensive survey
Radio frequency analysis and physical inspection using advanced spectrum analysis, non-linear junction detection, thermal imaging and systematic physical inspection of the agreed spaces.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Written report
A structured report suitable for leadership, legal and insurance purposes. Findings, risk levels and recommended actions. When nothing is found, you receive a documented record of that fact, which carries its own value for governance and legal proceedings.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Vulnerability assessment
Prioritised recommendations covering access controls, environmental weaknesses and areas of concern that may not involve devices but still represent confidentiality risk.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Post-survey guidance
Guidance on survey cadence, ongoing monitoring, behavioural protocols and how to stay covered between visits.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Retainer and periodic surveys
For clients who need to know their environment is clean on an ongoing basis. Retainer-based surveys scheduled around board cycles, transaction timelines or risk profiles.
How it works

How an engagement works

Blurred silhouette of a businessperson walking and talking on a phone beside a tiled urban building.
01
Initial consultation
A confidential conversation to understand your concerns, your environment and what you need to know by the end of it. This shapes the scope and approach.
02
Risk assessment
An assessment of the threat profile before any survey begins: who might target you, what methods they might use, and which environments are most exposed. The survey is more useful when it knows what it is looking for.
03
Physical inspection and radio frequency analysis
A systematic survey of the agreed spaces. Radio frequency detection across the usable spectrum, non-linear junction detection for dormant or passive devices, thermal analysis, power line analysis and detailed physical inspection. Offices, boardrooms, vehicles, vessels, temporary meeting rooms and private residences.
04
Secure reporting
A written report delivered through agreed secure channels. Findings, assessed risk and specific recommendations for decision-making at leadership level.
05
Mitigation and follow-up
Where vulnerabilities are identified, you receive immediate mitigation guidance and longer-term controls. Where devices are found, you receive advice on evidence handling, legal options and next steps. Periodic survey programmes can be designed to maintain assurance over time.
why grey prism

Grey Prism combines strategic advisory, intelligence capability, and discreet operational support to help organisations manage risk with clarity and confidence.

Gray geometric icon with a central circle and four corner shapes pointing inward.

Offensive background

The core team includes former UK Special Forces operators, military intelligence specialists and members of specialist police units. They have hands-on experience placing devices, which means they know exactly where to look for them, how they are concealed and what the standard sweep misses.
Black diagonal arrow pointing to the top left corner and another black diagonal arrow pointing to the bottom right corner on a white background.

Qualified to a documented standard

Technicians hold qualifications from REI, UKNACE and Komcept. The team includes offensive technical surveillance specialists, qualified network engineers and electricians. Engagements are delivered under ISO 9001-certified processes. That combination is rare among UK TSCM providers.
Black checkmark inside a box with two corner brackets.

Beyond the sweep

A device found is one outcome. A clean report is another. Both are useful. The wider value is in understanding how the environment was accessed, what behavioural or procedural gaps made it possible, and what needs to change. The focus is on the full threat picture, not just the detection.
Icon of a document with three horizontal lines inside a square frame with corner brackets.

Invisible by design

Presence on site is managed to avoid drawing attention. Scheduling, access and communications are handled to minimise visibility throughout. If anyone asks, the team was never there. The written record is different: everything is documented to a standard your board, legal team and insurer can rely on.
FAQs

Common questions

What is Technical Surveillance Counter-Measures?
Technical Surveillance Counter-Measures is the formal term for the detection and resolution of covert surveillance threats. It is sometimes called bug sweeping or electronic counter-surveillance. Professional TSCM uses advanced instrumentation and structured methodology to identify threats that consumer-grade detection equipment would miss.
How long does a survey take?
It depends on the environment and the number of technicians. A single boardroom might take several hours. A full corporate floor or large residence will typically require a full day or more. Every engagement is scoped in advance based on space, threat profile and the level of assurance required.
What environments do you survey?
Offices, boardrooms, conference facilities, sports facilities, private residences, vehicles, yachts, aircraft, hotel rooms and temporary meeting spaces.
What if nothing is found?
A clean survey is a valuable outcome. You receive a documented record that the environment was clear at the time of the sweep, which supports governance, legal proceedings and ongoing risk management. Many clients run periodic surveys specifically to maintain that record.
Can we engage you on a retainer?
Yes. Retainer arrangements and scheduled survey programmes are available, tied to governance calendars, transaction timelines or risk profiles. They are designed to provide ongoing assurance rather than a single snapshot.
How do you handle confidentiality and discretion?
Every engagement is governed by NDAs, controlled communications and scheduling designed to minimise visibility. Work is planned around your operations. Presence on site is managed so that, for most clients, the process is entirely unobtrusive.