OPS CIS is the foremost private investigation company in Phoenix, offering Technical Surveillance Counter Measures (“TSCM”) also known as bug sweep services.

OPS CIS utilizes cutting-edge and industry-leading, counter surveillance detection equipment and bug sweep services in Phoenix to protect clients' privacy and sensitive data. Our team of private investigators can assist in various counter surveillance investigations including:

  • Technical Surveillance Countermeasures (TSCM)
  • Surveillance Equipment Detection
  • Electronic Surveillance Detection
  • Counter Surveillance
  • Broadband Detection
  • Near-Field Transmission Detection
  • Intelligence Protection
  • Eavesdropping Detection
Play Video

What is TSCM?

Technical Surveillance Countermeasures (TSCM) refers to services employed to detect the presence of eavesdropping devices used to intercept sensitive, classified, or private information. TSCM is commonly referred to as a “bug sweep.” Bug sweeps utilize specialized equipment engineered to identify a variety of electronic transmitters, mostly common through radio frequencies.

RF Fundamentals

Radio Frequencies (RF) are electromagnetic waves that are propagated through space and are the basis for many different communication systems. Radio waves are identified by their frequency, with a useful communications range between 10 kHz and 100 GHz.

Common RF Signals

  • AM/FM Radio
  • Wi-Fi
  • Bluetooth
  • TV
  • GPS
  • Industrial, Scientific, and Medical (ISM) Devices

Arizona Crimes

  • ARS 13-3005 (Eavesdropping) makes it a class 5 felony to “intercept a conversation at which he is not present” without consent of the recorded party.
  • ARS 13-2923 (Stalking) makes it a up to a class 3 felony to “use any electronic, digital, or [GPS] system device to surveil a specific person”.
  • ARS 13-3019 (Surreptitious Recording) makes it up to a Class 4 felony to film anyone in a “location where the person has a reasonable expectation of privacy”.


Our counter surveillance detection services in Phoenix can help prevent loss and or interception of confidential communications

  • Attorney / Client privileged conversations regarding case strategies
  • Trade secret / Corporate intellectual property information
  • Sexual extortion / filming of intimate moments
  • Private medical information
  • Other sensitive data

TSCM Limitations

Our counter surveillance detection service in Phoenix is only a small part of a comprehensive data protection strategy. It is not fool-proof and with ever changing technologies TSCM investigators are always needing to adapt. TSCM is part of a “layered” approach to your personal or business security envelope. A bug sweep is only as good as the steps taken afterward to remain diligent about people and items in your spaces.

Types of Bugging / Wiretapping

  • Bugs - devices used to intercept audio signals, or communications, surreptitiously from their originating location. This can be accomplished by transmitting an audio signal with specialized equipment, or by using conventional means of eavesdropping.
  • Audio Bug - using conventional methods of eavesdropping such as a water glass or stethoscope to intercept communications without the use of electronics.
  • RF Bug - the use of radio transmitters to collect audio signals and broadcast them to another device, or listening post.
  • Ultrasonic / VLF (Very Low Frequency) Bug - a radio transmitter that collects audio signals and converts them into a frequency that is inaudible to the human ear, which typically ranges from 0 Hz to 20 kHz.
Hidden Camera Bug
  • Wiretapping - a technique that involves physically tampering with a line of communication via wire or another conductor (i.e., phone line, cable, CCTV, junction box, etc). This method produces an output of information at a higher quality and can be more secure (difficult to discover).
  • Hardwired Wiretap Hardwired Wiretap - physical access to a section of wire that the line of communication, or signal is traveling through. In this case, another set of wire is spliced into the primary source creating a junction that can be accessed and connected to a listening post.
  • Soft Wiretap - a technique that involves modification to the phone systems software by tampering with the PBX (Private Branch Exchange). The PBX switches calls between users on local lines.
  • Recording Wiretap - a technique that involves placing a recorder in or near the source of the communication line. This method typically requires the eavesdroppers to return to the wiretap and collect the data on the recorder.
  • Transmit Wiretap - this method involves placing a radio transmitter in or near the source of the communication line, but allows the device to broadcast an audio signal to a receiver in a different location.
Wiretap Bug

In today's ever-changing digital world, there are numerous security threats to individuals’ and businesses' privacy and confidentiality. From spyware to hidden cameras to audio listening devices, it is easier than ever for strangers to obtain private and personal information about you and your company. The erosion of personal privacy is an increasing and very real threat with the ease of obtaining cheap surveillance goods from the internet. Even worse, there are not enough knowledgeable counter surveillance investigators who can accurately investigate and determine if a person is under electronic surveillance. Many companies use antiquated and substandard counter surveillance detection. Phoenix, like the rest of the world, has sophisticated white-collar criminals who want your data, and that leaves you vulnerable.

OPS CIS offers world class counter surveillance and bug sweeping services in Phoenix and beyond. How can we help?

Contact Us Today

OPS Consulting and Investigative Services LLC

Live answering 24 hours a day!!