TSCM & Bug Sweeping
Protecting the confidentiality of your conversations, meetings and decisions.

Technical Surveillance Counter-Measures for corporate, governmental, residential and maritime environments. Structured detection, documented assurance, complete discretion.
The room looks clean. The meeting happened in a space you use every week. Nobody new was in the building. The conversation that followed still turned up somewhere it should not have. Technical Surveillance Counter-Measures exists for exactly this: the moment when clean-looking is no longer enough.
Technical Surveillance Counter-Measures (TSCM), also known as bug sweeping, is the structured process of detecting, identifying and addressing electronic eavesdropping threats. For organisations and individuals handling genuinely sensitive information, TSCM is an ongoing discipline that protects the integrity of your most important environments.
Grey Prism provides TSCM services to clients for whom confidentiality is foundational to how they operate.
Technical Surveillance Counter-Measures (TSCM), also known as bug sweeping, is the structured process of detecting, identifying and addressing electronic eavesdropping threats. For organisations and individuals handling genuinely sensitive information, TSCM is an ongoing discipline that protects the integrity of your most important environments.
Grey Prism provides TSCM services to clients for whom confidentiality is foundational to how they operate.
clients
Who we work with


Corporate and Transactions
Protecting strategic discussions, M&A activity and sensitive board processes. Periodic surveys timed to boardcycles, pre-transaction periods and critical decision points.

Corporate Transactions & M&A
Verified secure environments for deal-sensitive conversations, data rooms and negotiation spaces. Transaction integrity protected from initial approach to completion.

Government & Public Sector
Protecting sensitive discussions, classified environments and secure facilities. Survey programmes aligned to departmental requirements and security protocols.

Law Firms & Legal Counsel
Requiring certainty that privileged communications remain privileged. Survey reports documented to support legal proceedings and professional obligations.

Family Offices & UHNW Principals
Safeguarding privacy across residences, vehicles, yachts and travel. Discreet, scheduled surveys for clients whose personal and professional lives demand the same standard of protection.

Maritime Clients
Operating in environments where access control is complex and surveillance risk is elevated. Vessel surveys covering cabins, meeting spaces, communications infrastructure and shoreside facilities.

Event Organisers
Responsible for confidentiality at high-profile convenings, investor summits and executive retreats. Pre-event surveys of venues, breakout spaces and technical infrastructure.

Security Assessment
What you receive
A Grey Prism TSCM engagement tells you exactly what the threat picture is in your environment.
How it works
How an engagement works
.webp)
01
Initial consultation
A confidential conversation to understand your concerns, your environment and what you need to know by the end of it. This shapes the scope and approach.
02
Risk assessment
We assess the threat profile before any survey begins: who might target you, what methods they might use, and which environments are most exposed. The survey is more useful when it knows what it is looking for.
03
Physical inspection and radio frequency analysis
A systematic survey of the agreed spaces: radio frequency analysis across the determined spectrum, non-linear junction detection for dormant or passive devices, advanced thermal analysis, power line and cabling analysis, forensic inspection and detailed physical search. We survey offices, boardrooms, vehicles, vessels, temporary meeting rooms and private residences.
04
Secure reporting
A structured written report delivered through agreed secure channels. Findings, assessed risk and specific recommendations for decision-making at leadership level.
05
Mitigation and follow-up
Where vulnerabilities are identified, we advise on immediate mitigation and longer-term controls. Where devices are found, we advise on evidence handling, legal options and next steps. We can design a programme of periodic surveys to maintain assurance over time.
why grey prism
Grey Prism combines strategic advisory, intelligence capability, and discreet operational support to help organisations manage risk with clarity and confidence.
FAQs
Common questions
What is TSCM?
Technical Surveillance Counter-Measures is the formal term for the detection and resolution of covert surveillance threats. It is sometimes called bug sweeping or electronic counter-surveillance. Professional TSCM uses advanced instrumentation and structured methodology to identify threats that consumer-grade detection equipment would miss.
How long does a sweep take?
It depends on the environment and number of technicians. A single boardroom might take several hours. A full corporate floor or large residence will typically require a full day or more. We scope every engagement based on the space, the threat profile and how thorough the sweep needs to be.
What environments can you sweep?
Offices, boardrooms, conference facilities, sports facilities, private residences, vehicles, yachts, aircraft, hotel rooms and temporary meeting spaces.
What if nothing is found?
That is a valuable outcome. You receive a documented record that no devices were found at the time of the survey, which supports governance, legal proceedings and ongoing risk management. Many clients run periodic surveys specifically to maintain that record.
Can you provide ongoing assurance?
Yes. We offer retainer arrangements and scheduled survey programmes tied to governance calendars, transaction timelines or risk profiles.
How do you handle discretion?
Every engagement is governed by NDAs, controlled communications and scheduling designed to minimise visibility. We work around your operations, and our presence is managed to avoid drawing attention. Most clients find the process entirely unobtrusive.
Be certain your conversations are still private
services
.webp)
.webp)


.webp)







.webp)