Free Consultation

Confidential & Recommended Private Investigator Services Since 1967

Eavesdropping Detection (Bugs and Taps)


A worldwide leader in eavesdropping detection services since 1967. ICS has set the standard for non-government eavesdropping detection operations. As a protector of assets our firm engages our clients in the incident and prevention methods of approach. Unique to ICS our team can engage our clients within hours of the initial threat and we maintain a high degree or preparedness for all of our clients. When you need to trust a professional that not only can detect the threat but also assist in the identification and the formal prosecution, there is simply no other. We encourage you to contact us for an immediate consultation with rapid response.


Eavesdropping Detection

For this reason, we should all be aware of the possible dangers as well as the measures that can be taken to limit surveillance.

Standard telephone systems are very vulnerable to wiretaps. It doesn’t require a high level of skill or technology to intercept a voice communication. There are many locations where a wiretap can be placed. For example, microphones in many older telephone handsets can be replaced with one that can also transmit to a remote receiver. Taps can also be placed at the telephone boxes in the basements of buildings, on the lines outside of a home or office, or on telephone pole junction boxes.

New technologies, such as computerized voice recognition, which can automate surveillance, are being actively developed. There are also reports that the U.S. government assisted the Colombian government in tracking down drug cartel leaders by using voice recognition technologies on cellular phone calls.

Most types of electronic communication can be intercepted without a high level of expertise or expensive equipment. Surveillance equipment is not difficult to construct and is available in many electronics stores. Many manufacturers sell surveillance devices to any buyer, without restrictions. With the range of small and affordable eavesdropping equipment now available, the threat of eavesdropping is becoming more of a problem.

There are four examples of bugging devices commonly used:

  • Acoustic Bug: A type of bugging device that does not use electronics. Eavesdropping occurs through the use of a drinking glass, stethoscope, rubber tube, tape recorder, digital recorder, or other device that enables the eavesdropper to hear what is being said.
  • Ultrasonic or VLF Bug: A device which converts the sound into an audio signal which cannot be heard by human ears. The ultrasound signal is intercepted and converted back to audible frequencies.
  • Radio Frequency Bug: The most common type of audio bugging device. This device uses a transmitter to capture sounds and transport them to another location.
  • Optical Bug: Converts sound into an optical pulse.

Persons known or unknown to you may use these devices to steal information in an effort to further their goals. A bugging device or wiretap can be a key component of pre-attack intelligence gathering. Eavesdropping is the one early-warning sign of spying that can be detected. Many times, when eavesdropping is detected, the attack can be thwarted. Proactive eavesdropping detection is cheap insurance.

ICS offers Technical Surveillance Countermeasures (TSCM) or "bug detection" nationwide, and we specialize in protecting communications against illegal eavesdropping, wiretapping, video voyeurism, and corporate espionage.

TSCM services include a physical search of the target site along with state-of-the-art eavesdropping detection equipment to locate devices such as:

  • Hidden microphones
  • Bugs and taps
  • Transmitters
  • Audio recorders
  • GPS tracking devices
  • Closed-circuit television systems (CCTV)
  • Covert cameras which operate by infrared, spread-spectrum, frequency hopping, burst, carrier current, or other transmission methods.

FOR PURPOSES OF SERVICE INTEGRITY, ICS DOES NOT EMPLOY ITS KNOWLEDGE OF EXPERTISE FOR THE USE OR MARKETING OR WEB MATERIAL.

Technical Surveillance Countermeasures
Technical Surveillance Countermeasures (TSCM): Counterintelligence techniques and measures...

WE HIGHLY RECOMMEND YOU CONTACT OUR OFFICE FOR A FREE CONSULTATION FOR YOUR MATTER-- ONLINE OR OTHERWISE 24/7.


(2/20/2013)

A consultation for this investigation type may request the following information:

  1. What is your role?
  2. Are you developing a RFI, RFP or Bid for this matter?
  3. Are you or is someone in danger for life or otherwise?
  4. By what date do the services need to be complete?
  5. Do you have "Broadband" internet access? (DSL/CABLE/T1/OC12)
  6. Do you use VoIP? (Vonage/XO/Other)
  7. Is there use of computers involved?
  8. Do you use voicemail?
  9. What type of building is to be inspected?
  10. How many locations will need to be inspected?
  11. How many people are involved?
  12. How many phone lines do you have?
  13. How many computers are in question?
  14. How may extensions and/or handsets are in use?
  15. What is the total square feet of the location to be examined?
  16. Are you aware of any encryption or passwords in use?
  17. Have you considered counter-surveillance?
  18. How many subjects may be involved?
  19. Is there a civil suit pending or has been filed?
  20. Was there a police report created?
  21. Please understand that the funding for your case may vary depending on the complexity. So that we may help you, what range of funding would you estimate to be affordable for this matter?
  22. Will you need these services on a regular or recurring basis?
  23. Describe the circumstances and requirements of your case to us. Please include any and all information that may be important. Even the most minor detail can be considered helpful. (The Story)
  24. If you used a search engine to find us, please type the keywords here:

Leave Comment

(Redacted) commented 825 days ago
I need help. In my home, tested. need counter surveillance.Please contact asap (Redacted)
John commented 1789 days ago
My phone is being monitored and computer, how can I talk to you without disclosing my intentions, a secure way of having a consultation ?
James commented 2046 days ago
My neighbor blasts me all hours when I' in bed trying to sleep, with an ultrasonic device. Also, he has a see-through-the-wall device trained on my residence almost 24-hrs. a day. I can hear a faint audible sound it makes. As a results, I'm having health problems. I contacted the police and they don't know any laws pertaining to ultrasonice. However, covert surveillance is illegal, but evidence is almost impossible to get.Do you have any suggestions?
Nesley commented 2320 days ago
I require your services to detect illegal eavesdropping and microcameras devices planted in my house in vehicle. They listen to just about everything.
Maggie commented 2377 days ago
I have had cell tap and entire phone bugged video comes on and key logger the whole works..... I' ve called local pd my cellular provider and a private investigator and my family lawyer in on this... Knowing who its doing third really had helped alot.... I'd like to say thank you for your help and for understanding.... I will be seeing you guys soon.... Worth every penny......
Debbie H commented 2861 days ago
My problem is huge. I have bugs, listening devices, theft, video voyerism, video of me on the toilet, at school where I work and more. Cars follow me 24 7 my computer has a keylogger and web watcher, and my phone and cell have tape recording devices as a slip account as they listen to just about everything.
Michael W commented 2998 days ago
I require your services for this service that you offer.
Kathi commented 3071 days ago
Is there a way to spy on cell phone, voice mail, and text messages?
kimani commented 3311 days ago
well am student in kenya and currently undertaking security studies and soon hope to open up a security firm on private investigation your opinion on how to go about it please advise. i know your are the best.

Recent Investigation Inquiries

Origin Investigation Location
Virginia United States
Arizona United States
Tennessee
Kansas United States
South Carolina Ukraine
New York United States
West Virginia Arizona
New York United States
California United States
New York Tennessee

Find a Private Investigator by Closest Region

The ICS private investigator network can manage your case locally or across multiple jurisdictions. Your case will be worked by qualified and licensed private investigators where applicable. Through the innovative ICS Licensee Program, we are able to provide local private investigators in several states. Not all services are available in all areas. All private investigators can be identified upon request according to State law. Find a local Private Investigator:

Birmingham
Huntsville
Mobile
Montgomery
Fairbanks
Chandler
Flagstaff
Glendale
Mesa
Peoria
Phoenix
Scottsdale
Tempe
Tucson
Little Rock
Anaheim
Bakersfield
Beverly Hills
Chula Vista
Fremont
Fresno
Glendale
Huntington Beach
Irvine
Long Beach
Los Angeles
Modesto
Newport Beach
Oakland
Orange County
Riverside
Sacramento
San Bernardino
San Diego
San Francisco
San Jose
Santa Ana
Stockton
Aurora
Colorado Springs
Denver
Fort Collins
Thornton
Westminster
Bridgeport
Greenwich
Hartford
New Haven
Stamford
Waterbury
Dover
Wilmington
Washington
Cape Coral
Clearwater
Fort Lauderdale
Gainesville
Hollywood
Jacksonville
Miami
Orlando
St Petersburg
Tallahassee
Tampa
Athens
Atlanta
Augusta
Columbus
Savannah
Hilo
Honolulu
Kailua
Maui
Oahu
Boise
Addison
Aurora
Chicago
Joliet
Kankakee
Naperville
Oak Park
Peoria
Rockford
Schaumburg
Springfield
Waukegan
Evansville
Fort Wayne
Gary
Indianapolis
South Bend
Terre Haute
Cedar Rapids
Davenport
Des Moines
Kansas City
Overland Park
Topeka
Wichita
Frankfort
Lexington
Louisville
Baton Rouge
Lafayette
Metairie
New Orleans
Shreveport
Portland
Annapolis
Anne Arundel County
Arnold
Baltimore
Chevy Chase Village
Columbia Ellicott City Elkridge
Crofton Crownsville
Silver Spring
Boston
Cambridge
Lowell
Springfield
Worcester
Ann Arbor
Dearborn
Detroit
Flint
Grand Rapids
Lansing
Sterling Heights
Warren
Apple Valley
Duluth
Minneapolis
St Paul
Jackson
Branson
Columbia
Florissant
Independence
Jefferson City
Kansas City
Springfield
Billings
Lincoln
Omaha
Carson City
Henderson
Las Vegas
Paradise
Reno
Spring Valley
Sunrise Manor
Manchester
Edison
Elizabeth
Jersey City
Newark
Paterson
Trenton
Albuquerque
Albany
Buffalo
New York City
Rochester
Syracuse
Yonkers
Cary
Charlotte
Durham
Fayetteville
Greensboro
Raleigh
Winston Salem
Bismarck
Fargo
Akron
Canton
Cincinnati
Cleveland
Columbus
Dayton
Marietta
Sandusky
Steubenville
Toledo
Youngstown
Norman
Oklahoma City
Tulsa
Bend
Eugene
Portland
Salem
Allentown
Bethlehem
Erie
Gettysburg
Harrisburg
Hershey
Norristown
Philadelphia
Pittsburgh
Providence
Charleston
Columbia
Sioux Falls
Brentwood
Chattanooga
Clarksville
Davidson County
Gallatin
Knoxville
La Vergne
Memphis
Mount Juliet
Murfreesboro
Nashville
Smyrna
Amarillo
Austin
Corpus Christi
Dallas
El Paso
Fort Worth
Houston
Lubbock
Plano
San Antonio
Ogden
Provo
Salt Lake City
West Valley City
Burlington
Alexandria
Arlington
Chesapeake
Fairfax
Hampton
Loudoun
Newport News
Norfolk
Northern Virginia
Prince William
Richmond
Roanoke
Suffolk
Tidewater
Virginia Beach
Bellevue
Olympia
Seattle
Spokane
Tacoma
Vancouver
Charleston
Green Bay
Madison
Milwaukee
Cheyenne
Calgary
Edmonton
Strathcona County
Abbotsford
Kelowna
Vancouver
Victoria
Brandon
Winnipeg
Fredericton
Moncton
Saint John
Conception Bay South
Corner Brook
Gander
St Johns
Yellowknife
Amherst
Cape Breton
Halifax
Barrie
Brampton
Chatham Kent
Guelph
Hamilton
Kingston
Kitchener
London
Oshawa
Ottawa
Peterborough
St Catharines
Sudbury
Thunder Bay
Toronto
Windsor
Charlottetown
Summerside
Laval
Longueuil
Montreal
Quebec City
Saguenay
Sherbrooke
Trois Rivieres
Prince Albert
Regina
Saskatoon
Whitehorse
Beijing
Chongqing
Hong Kong
Macao
Shanghai
Tianjin
Barranquilla
Bogota
Cali
Cartagena
Medellin
Pereira
San Salvador
Bangalore
Chennai
Delhi
Hyderabad
Kolkata
Mumbai
Kiev
Sevastopol
Abu Dhabi
Limon
Puntarenas
San Jose

Copyright © 2017 International Counterintelligence Services, Inc. All rights reserved.