Like many companies, Mias took the decision to cease operations during the Covid 19 pandemic and during this time we have not made any operators furloughed. We have made the decision that the time while many companies still have their staff working from home would be a good time to schedule a TSCM and cyber […]
Category Archives: Electronic Bug Sweeping
Eavesdropping technology can be so cheap that most anyone with nefarious intent can plant a bug. At the most rudimentary level, all it takes is a device costing as little as £15 from eBay hidden in an out-of-the way nook .Once upon a time a device was large battery hungry and could be picked up […]
If you are hosting a meeting or a conference and wish to keep what is being discussed private, we recommend having a bug sweep of the room prior to the meeting or conference beginning this will render the room sterile and safe to discuss the valuable information. We also recommend that during the meeting that […]
RF analysis has changed For a while bugging transmitters were getting more elaborate and trickier to find using RF analysis you were finding devices becoming commercially available that could be programmed to be switched off by remote control if the attacker knew that a bug sweep team were in the building, the device would send […]
Mias TSCM have recently been tasked by a holiday rental company to sweep its holiday chalets and caravans for hidden cameras and listening devices. There are several news across United Kingdom and USA of being found hidden cameras by the customers. Recently some Airbnb Couple Finds Hidden Cameras in Bathroom in the bathroom and […]
TCSM represents Technical Surveillance Counter Measures also known as bug sweeping, and it is professional business domain which deals in counter surveillance services. A top-notch TSCM expert is expert at detecting and expelling removing spy gadgets for securing the privacy of the clients. There are a various services these professionals offer to keep their clients […]
The rich and powerful often own or charter luxury yachts for their enjoyment as well as the enjoyment of their equally rich and powerful friends and associates. Everyone on board is there for a relaxing day in the sun or to enjoy a weekend or longer vacation. Guests on board could be well-known celebrities, political […]
One of the problems is that these tiny, inconspicuous cameras are they can be easily purchased online. Browsing Amazon for hidden cameras is a little disconcerting. Cameras are disguised as alarm clocks, power adapters, smoke detectors, photo frames and even water bottles, most of these are wireless and battery powered. These cameras are easy to […]
TSCM (technical surveillance counter-measures) or more commonly known as electronic bug sweep is to counter-measure any professional attack from a electronic surveillance device including covert listening devices, covert visual surveillance and now cyber surveillance where buggist will use software and hardware tools to access computing and mobile devices. Most bugs transmit information, whether data, video, […]
In spying and counterintelligence, electronic surveillance is the act of monitoring of behavior, activities for the use of influencing, managing, directing, or protecting people. This can include watching from a safe distance by means of electronic device (such as closed-circuit television (CCTV) cameras) or interception of electronically transmitted information (such as Internet traffic or phone […]