Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the customify domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/d709636icnoa/public_html/lockedoninvestigations.com/wp-includes/functions.php on line 6121
Technical Surveillance Counter Measures - Locked On Investigations, LLC
Menu Close

TECHNICAL SURVEILLANCE COUNTER MEASURES (TSCM) includes Bug Sweeps and Eavesdropping Detection Devices.

Nothing is more valuable than Security. You lock the doors to your home, you hide your passwords on your social media and everything else digital, you even have a PIN code and some screen lock on your cellphone. With all that effort to maintain your privacy and security, would you want someone listening in to your conversations and accessing sensitive information?

That is where we come in. With usage of the latest equipment and an extensive knowledge of the electrical trade, we can detect those devices that put you and your safety at risk. Actual Investigation: An employee believed that they were treated differently due to religious reasons and sought to gather information using clandestine techniques to give that information to the Equal Employment Opportunity Commission when they filed suit against their soon to be former employer. The employee, placed a small auditory transmitting device above the drop ceiling, which had 120V 20A receptacles mounted to the ceiling above the drop ceiling. The employee then transmitted the conversation to an GSM device that would then transmit everything to a digital platform to be preserved and retrieved at any time in the future. When the employee was informed that such actions were illegal the employee decided to sell the information to others as well as perform personal revenge activities with the information. The employee sold information to the businesses competitor which included contract negotiates with a potential new customer that included services to be provided and pricing on the services, conversations in regards to client disputes which enabled the competitors to secure a few of the company’s customer base. Conversations were had that discussed future initiatives, that another competitor jumped on with insight provided by the employee. The personal revenge portion was the company CEO and a Salesperson were involved in an ongoing affair which they were both married, but with the information their spouses received divorces were filed by both families. One disgruntled employee cost this company a lot. I believe in the aftermath of it all the company went bankrupt, the CEO was sued by the salesperson for Sexual Harassment in the workplace in a failed attempt to save their marriage, the revenues lost to their competitors reached about $750,000.00. The employee that did all this made an estimated $385,000.00 but was only fined by the courts $75,000.00, no time in jail, and 2 years SIS Probation and due to the SIS it is not disclosable (which is why no names are in this case review), the scariest part, this employee may be working for you and you would never know it, until it was too late.

In the United States you may record conversations that you are a party to, this means you have to be an active party in the conversation, not the topic of the conversation between 2 or more persons.

Equipment we use include:

  • Telephone Line Analyzer
  • Wireless Camera/Video Receiver/Transmitter Interceptor
  • Global System for Mobile (Cellular Phone), Wi-Fi, Bluetooth Detector
  • Field Strength Meter
  • Frequency Spectrum Analyzer
  • Network Protocol Analyzer
  • Black Light/UV Light Inspection Equipment
  • Borescope & Other Physical Inspection Devices
  • Multi-Meter & Outlet Tester
  • IR/Thermal Imagery Equipment
  • Non-Linear Junction Detector/Evaluator
  • Ultra-Sensitive VLF/UHF/IR Probe Equipment

Our Counter Surveillance operations will detect, locate, and remove the following:

  • TSCM Services & Bug Sweeps
  • Audio Recording or Transmitting Devices
  • Wiretapping & Listening (Bug) Devices
  • Vehicle Tracking Devices – GPS “Apple Air Tag”
  • Residential & Domestic Surveillance
  • Corporate Counter-Espionage
  • Counter-Surveillance Measures and Tactics
  • Electronic Surveillance Detection
  • Covert Video Device Detection
  • Listening Device Detection
  • Hidden Camera Detection

TSCM are typically performed after one or more of the following events occur:

  • Noise (Static, Ticks, or Muffled) on the telephone lines.
  • Sensitive Information is known by another unauthorized individual.
  • After a burglary/home intrusion/breaking and entering.
  • Concern that conversations are being intercepted.
  • Concerned with the existence of a listening device.
  • Unsolicited repairman visits.
  • Domestic or business relationship problems.
Verified by MonsterInsights