If you are dealing with an active incident — call us now. We monitor this line continuously.
Active Incident Line

TSCM & Bug Sweeping

Protecting the confidentiality of your conversations, meetings and decisions.
Man in a dark suit with a tie standing behind glass panels and concrete beams in an urban setting.

Technical Surveillance Counter-Measures for corporate, governmental, residential and maritime environments. Structured detection, documented assurance, complete discretion.

The room looks clean. The meeting happened in a space you use every week. Nobody new was in the building. The conversation that followed still turned up somewhere it should not have. Technical Surveillance Counter-Measures exists for exactly this: the moment when clean-looking is no longer enough.

Technical Surveillance Counter-Measures (TSCM), also known as bug sweeping, is the structured process of detecting, identifying and addressing electronic eavesdropping threats. For organisations and individuals handling genuinely sensitive information, TSCM is an ongoing discipline that protects the integrity of your most important environments.

Grey Prism provides TSCM services to clients for whom confidentiality is foundational to how they operate.
clients

Who we work with

Blurred silhouette of a businessperson walking and talking on a phone beside a tiled urban building.
Corporate and Transactions
Protecting strategic discussions, M&A activity and sensitive board processes. Periodic surveys timed to boardcycles, pre-transaction periods and critical decision points.
Corporate Transactions & M&A
Verified secure environments for deal-sensitive conversations, data rooms and negotiation spaces. Transaction integrity protected from initial approach to completion.
Government & Public Sector
Protecting sensitive discussions, classified environments and secure facilities. Survey programmes aligned to departmental requirements and security protocols.
Law Firms & Legal Counsel
Requiring certainty that privileged communications remain privileged. Survey reports documented to support legal proceedings and professional obligations.
Family Offices & UHNW Principals
Safeguarding privacy across residences, vehicles, yachts and travel. Discreet, scheduled surveys for clients whose personal and professional lives demand the same standard of protection.
Maritime Clients
Operating in environments where access control is complex and surveillance risk is elevated. Vessel surveys covering cabins, meeting spaces, communications infrastructure and shoreside facilities.
Event Organisers
Responsible for confidentiality at high-profile convenings, investor summits and executive retreats. Pre-event surveys of venues, breakout spaces and technical infrastructure.
Modern building corner with dark, reflective metal panels and concrete pavement.
Security Assessment

What you receive

A Grey Prism TSCM engagement tells you exactly what the threat picture is in your environment.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Comprehensive survey
Radio frequency analysis, non-linear junction detection, advanced thermal imaging, forensic inspection, cabling analysis and systematic physical inspection of the agreed spaces.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Written report
Suitable for leadership, legal and insurance purposes: findings, risk levels and recommended actions. Where no devices are found, you receive a documented record of that fact, which carries its own value for governance and legal proceedings.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Vulnerability assessment
Prioritised recommendations covering access controls, environmental weaknesses and areas of concern that may not involve devices but still represent confidentiality risk, assisting with ongoing risk mitigation.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Post-survey guidance
On survey cadence, ongoing monitoring, implementation of permanently in-place countermeasures, behavioural protocols and how to stay protected between visits.
Four people seated around a conference table in a glass-walled office with large windows overlooking a cityscape.
Retainer and periodic surveys
For clients who need their sensitive environments routinely surveyed, Grey Prism offers retainer-based surveys: pre-board, pre-transaction, quarterly, or on a schedule determined by your risk profile.
How it works

How an engagement works

Blurred silhouette of a businessperson walking and talking on a phone beside a tiled urban building.
01
Initial consultation
A confidential conversation to understand your concerns, your environment and what you need to know by the end of it. This shapes the scope and approach.
02
Risk assessment
We assess the threat profile before any survey begins: who might target you, what methods they might use, and which environments are most exposed. The survey is more useful when it knows what it is looking for.
03
Physical inspection and radio frequency analysis
A systematic survey of the agreed spaces: radio frequency analysis across the determined spectrum, non-linear junction detection for dormant or passive devices, advanced thermal analysis, power line and cabling analysis, forensic inspection and detailed physical search. We survey offices, boardrooms, vehicles, vessels, temporary meeting rooms and private residences.
04
Secure reporting
A structured written report delivered through agreed secure channels. Findings, assessed risk and specific recommendations for decision-making at leadership level.
05
Mitigation and follow-up
Where vulnerabilities are identified, we advise on immediate mitigation and longer-term controls. Where devices are found, we advise on evidence handling, legal options and next steps. We can design a programme of periodic surveys to maintain assurance over time.
why grey prism

Grey Prism combines strategic advisory, intelligence capability, and discreet operational support to help organisations manage risk with clarity and confidence.

Gray geometric icon with a central circle and four corner shapes pointing inward.

Offensive background

The core team includes former UK Special Forces operators, military intelligence specialists and members of specialist police units. They have hands-on experience placing devices, which means they know exactly where to look for them, how they are concealed and what the standard sweep misses.
Black diagonal arrow pointing to the top left corner and another black diagonal arrow pointing to the bottom right corner on a white background.

Qualified to a documented standard

Technicians hold qualifications from REI, UKNACE and Komcept. The team includes offensive technical surveillance specialists, qualified network engineers and electricians. Engagements are delivered under ISO 9001-certified processes. That combination is rare among UK TSCM providers.
Black checkmark inside a box with two corner brackets.

Beyond the sweep

A device found is one outcome. A clean report is another. Both are useful. The wider value is in understanding how the environment was accessed, what behavioural or procedural gaps made it possible, and what needs to change. The focus is on the full threat picture, not just the detection.
Icon of a document with three horizontal lines inside a square frame with corner brackets.

Invisible by design

Presence on site is managed to avoid drawing attention. Scheduling, access and communications are handled to minimise visibility throughout. If anyone asks, the team was never there. The written record is different: everything is documented to a standard your board, legal team and insurer can rely on.
FAQs

Common questions

What is TSCM?
Technical Surveillance Counter-Measures is the formal term for the detection and resolution of covert surveillance threats. It is sometimes called bug sweeping or electronic counter-surveillance. Professional TSCM uses advanced instrumentation and structured methodology to identify threats that consumer-grade detection equipment would miss.
How long does a sweep take?
It depends on the environment and number of technicians. A single boardroom might take several hours. A full corporate floor or large residence will typically require a full day or more. We scope every engagement based on the space, the threat profile and how thorough the sweep needs to be.
What environments can you sweep?
Offices, boardrooms, conference facilities, sports facilities, private residences, vehicles, yachts, aircraft, hotel rooms and temporary meeting spaces.
What if nothing is found?
That is a valuable outcome. You receive a documented record that no devices were found at the time of the survey, which supports governance, legal proceedings and ongoing risk management. Many clients run periodic surveys specifically to maintain that record.
Can you provide ongoing assurance?
Yes. We offer retainer arrangements and scheduled survey programmes tied to governance calendars, transaction timelines or risk profiles.
How do you handle discretion?
Every engagement is governed by NDAs, controlled communications and scheduling designed to minimise visibility. We work around your operations, and our presence is managed to avoid drawing attention. Most clients find the process entirely unobtrusive.

Be certain your conversations are still private