Celebrating 50 years providing professional private investigations worldwide!

Celebrating 50 years providing professional private investigations worldwide!

Private Investigator Free Consultation (24hrs)

Available 24 hours with Rapid Response

Eavesdropping Detection (Bugs and Taps)


A worldwide leader in eavesdropping detection services since 1967. ICS has set the standard for non-government eavesdropping detection operations. As a protector of assets our firm engages our clients in the incident and prevention methods of approach. Unique to ICS our team can engage our clients within hours of the initial threat and we maintain a high degree or preparedness for all of our clients. When you need to trust a professional that not only can detect the threat but also assist in the identification and the formal prosecution, there is simply no other. We encourage you to contact us for an immediate consultation with rapid response.


Eavesdropping Detection

For this reason, we should all be aware of the possible dangers as well as the measures that can be taken to limit surveillance.

Standard telephone systems are very vulnerable to wiretaps. It doesn’t require a high level of skill or technology to intercept a voice communication. There are many locations where a wiretap can be placed. For example, microphones in many older telephone handsets can be replaced with one that can also transmit to a remote receiver. Taps can also be placed at the telephone boxes in the basements of buildings, on the lines outside of a home or office, or on telephone pole junction boxes.

New technologies, such as computerized voice recognition, which can automate surveillance, are being actively developed. There are also reports that the U.S. government assisted the Colombian government in tracking down drug cartel leaders by using voice recognition technologies on cellular phone calls.

Most types of electronic communication can be intercepted without a high level of expertise or expensive equipment. Surveillance equipment is not difficult to construct and is available in many electronics stores. Many manufacturers sell surveillance devices to any buyer, without restrictions. With the range of small and affordable eavesdropping equipment now available, the threat of eavesdropping is becoming more of a problem.

There are four examples of bugging devices commonly used:

  • Acoustic Bug: A type of bugging device that does not use electronics. Eavesdropping occurs through the use of a drinking glass, stethoscope, rubber tube, tape recorder, digital recorder, or other device that enables the eavesdropper to hear what is being said.
  • Ultrasonic or VLF Bug: A device which converts the sound into an audio signal which cannot be heard by human ears. The ultrasound signal is intercepted and converted back to audible frequencies.
  • Radio Frequency Bug: The most common type of audio bugging device. This device uses a transmitter to capture sounds and transport them to another location.
  • Optical Bug: Converts sound into an optical pulse.

Persons known or unknown to you may use these devices to steal information in an effort to further their goals. A bugging device or wiretap can be a key component of pre-attack intelligence gathering. Eavesdropping is the one early-warning sign of spying that can be detected. Many times, when eavesdropping is detected, the attack can be thwarted. Proactive eavesdropping detection is cheap insurance.

ICS offers Technical Surveillance Countermeasures (TSCM) or "bug detection" nationwide, and we specialize in protecting communications against illegal eavesdropping, wiretapping, video voyeurism, and corporate espionage.

TSCM services include a physical search of the target site along with state-of-the-art eavesdropping detection equipment to locate devices such as:

  • Hidden microphones
  • Bugs and taps
  • Transmitters
  • Audio recorders
  • GPS tracking devices
  • Closed-circuit television systems (CCTV)
  • Covert cameras which operate by infrared, spread-spectrum, frequency hopping, burst, carrier current, or other transmission methods.

FOR PURPOSES OF SERVICE INTEGRITY, ICS DOES NOT EMPLOY ITS KNOWLEDGE OF EXPERTISE FOR THE USE OR MARKETING OR WEB MATERIAL.

Technical Surveillance Countermeasures
Technical Surveillance Countermeasures (TSCM): Counterintelligence techniques and measures...

WE HIGHLY RECOMMEND YOU CONTACT OUR OFFICE FOR A FREE CONSULTATION FOR YOUR MATTER-- ONLINE OR OTHERWISE 24/7.


(2/20/2013)

A consultation for this investigation type may request the following information:

  1. What is your role?
  2. Are you developing a RFI, RFP or Bid for this matter?
  3. Are you or is someone in danger for life or otherwise?
  4. By what date do the services need to be complete?
  5. Do you have "Broadband" internet access? (DSL/CABLE/T1/OC12)
  6. Do you use VoIP? (Vonage/XO/Other)
  7. Is there use of computers involved?
  8. Do you use voicemail?
  9. What type of building is to be inspected?
  10. How many locations will need to be inspected?
  11. How many people are involved?
  12. How many phone lines do you have?
  13. How many computers are in question?
  14. How may extensions and/or handsets are in use?
  15. What is the total square feet of the location to be examined?
  16. Are you aware of any encryption or passwords in use?
  17. Have you considered counter-surveillance?
  18. How many subjects may be involved?
  19. Is there a civil suit pending or has been filed?
  20. Was there a police report created?
  21. Please understand that the funding for your case may vary depending on the complexity. So that we may help you, what range of funding would you estimate to be affordable for this matter?
  22. Will you need these services on a regular or recurring basis?
  23. Describe the circumstances and requirements of your case to us. Please include any and all information that may be important. Even the most minor detail can be considered helpful. (The Story)
  24. If you used a search engine to find us, please type the keywords here:

Case Studies: Eavesdropping Detection (Bugs and Taps)

Cell Phone Spying Suspicions

Espionage, eavesdropping or spying can take many forms in today's age of technology, and has...


Leave Comment

(Redacted) commented 941 days ago
I need help. In my home, tested. need counter surveillance.Please contact asap (Redacted)
John commented 1905 days ago
My phone is being monitored and computer, how can I talk to you without disclosing my intentions, a secure way of having a consultation ?
James commented 2162 days ago
My neighbor blasts me all hours when I' in bed trying to sleep, with an ultrasonic device. Also, he has a see-through-the-wall device trained on my residence almost 24-hrs. a day. I can hear a faint audible sound it makes. As a results, I'm having health problems. I contacted the police and they don't know any laws pertaining to ultrasonice. However, covert surveillance is illegal, but evidence is almost impossible to get.Do you have any suggestions?
Nesley commented 2436 days ago
I require your services to detect illegal eavesdropping and microcameras devices planted in my house in vehicle. They listen to just about everything.
Maggie commented 2493 days ago
I have had cell tap and entire phone bugged video comes on and key logger the whole works..... I' ve called local pd my cellular provider and a private investigator and my family lawyer in on this... Knowing who its doing third really had helped alot.... I'd like to say thank you for your help and for understanding.... I will be seeing you guys soon.... Worth every penny......
Debbie H commented 2977 days ago
My problem is huge. I have bugs, listening devices, theft, video voyerism, video of me on the toilet, at school where I work and more. Cars follow me 24 7 my computer has a keylogger and web watcher, and my phone and cell have tape recording devices as a slip account as they listen to just about everything.
Michael W commented 3114 days ago
I require your services for this service that you offer.
Kathi commented 3187 days ago
Is there a way to spy on cell phone, voice mail, and text messages?
kimani commented 3427 days ago
well am student in kenya and currently undertaking security studies and soon hope to open up a security firm on private investigation your opinion on how to go about it please advise. i know your are the best.

Recent Investigation Inquiries

Origin Investigation Location
California United States
Arizona United States
Connecticut Québec, Canada
Connecticut United States
North Carolina New York
Washington United States
Washington
Virginia United States
Illinois United States
Illinois Illinois, United States

Find a Private Investigator by Closest Region

The ICS private investigator network can manage your case locally or across multiple jurisdictions. Your case will be worked by qualified and licensed private investigators where applicable. Through the innovative ICS Licensee Program, we are able to provide local private investigators in several states. Not all services are available in all areas. All private investigators can be identified upon request according to State law. Find a local Private Investigator:

Newport Beach
Columbia Ellicott City Elkridge
Crofton Crownsville
Dearborn
Apple Valley
Duluth
Columbia
Paradise
Tidewater
Calgary
Edmonton
Strathcona County
Abbotsford
Kelowna
Vancouver
Victoria
Brandon
Winnipeg
Fredericton
Moncton
Saint John
Conception Bay South
Corner Brook
Gander
St Johns
Yellowknife
Amherst
Cape Breton
Halifax
Barrie
Brampton
Chatham Kent
Guelph
Hamilton
Kingston
Kitchener
London
Oshawa
Ottawa
Peterborough
St Catharines
Sudbury
Thunder Bay
Toronto
Windsor
Charlottetown
Summerside
Laval
Longueuil
Montreal
Quebec City
Saguenay
Sherbrooke
Trois Rivieres
Prince Albert
Regina
Saskatoon
Whitehorse
Beijing
Chongqing
Hong Kong
Macao
Shanghai
Tianjin
Barranquilla
Bogota
Cali
Cartagena
Medellin
Pereira
San Salvador
Bangalore
Chennai
Delhi
Hyderabad
Kolkata
Mumbai
Kiev
Sevastopol
Abu Dhabi
Limon
Puntarenas
San Jose

Copyright © 2017 International Counterintelligence Services, Inc. All rights reserved.