Counter Surveillance
We use technology to break technology
Disrupting technology abuse is at the core of our business. If you feel that you are being stalked or a victim of malicious spyware, hidden cameras and other forms of illegal surveillance we can assist in detecting and removing these threats.
By partnering with the nation’s leaders in family and domestic violence services, policing, technology, security and government we’re able to put in place tailor made, highly effective risk and safety measures.
Ultimately, our top priority is to ensure our clients feel safe and secure at all times. a combined 100+ years of operational law enforcement, military and corporate risk management experience, we bring a unique, concentric layered approach to safety and security for our clients.
Australia's TSCM Leaders
Effective Solutions
Expertise
With a combined 100+ years of experience in safety and security - and a deep knowledge of how perpetrators operate - Protective Group know how, where, and what to look for.
Safety first
While detecting threats is what we do, one thing always comes first - reducing risk. Our assessors are trained to be discrete, diligent, and sensitive to the unique security needs of each client.
Thinking ahead
In the ever-changing threat landscape of technology-facilitated abuse, you're either ahead of the curve or falling behind. That's why we are constantly researching the tricks and tactics used by perpetrators, and always looking for new ways to counter threats.
Equipment
To counter the huge variety of covert surveillance equipment available, we employ a wide array of different technologies and techniques to ensure that every camera lens, microphone, tracking device and spyware app is detected.
Protective Group Licensing and Accreditation
TSCM Car Bug Sweep
Our Car Bug Sweep service is conducted on a vehicle to detect and remove any unauthorised surveillance devices or bugs. TSCM sweeps are carried out by Protective Group using specialist equipment to scan for electronic eavesdropping devices that might be covertly installed to spy on conversations, track movements, or gather other forms of intelligence.
A Protective Group TSCM Car Bug Sweep can assist with detecting, locating and removing the following covert devices on your car:
-
Listening Devices (Bugs)
-
GPS Trackers
-
Hidden Cameras
-
RF transmitters
-
Bluetooth or Wi-Fi Surveillance Devices
-
Phone Interception Devices
-
Thermal Imaging or Vibration Sensors
TSCM Home Bug Sweep
Our Home Bug Sweep service is conducted on a home to detect and remove any unauthorised surveillance devices or bugs. TSCM sweeps are carried out by Protective Group using specialist equipment to scan for electronic eavesdropping devices that might be covertly installed to spy on conversations, whether it's actively transmitting signals or passively recording data. The sweep typically covers various parts of the home such as living rooms, bedrooms, offices, and any other areas where privacy could be compromised.
A Protective Group TSCM Home Bug Sweep can assist with detecting, locating and removing the following covert devices in your home:
-
Audio Bugs (Listening Devices)
-
Hidden Cameras (Video Surveillance Devices)
-
Wireless Devices (RF and Bluetooth Transmitters)
-
GSM Bugs (Cellular-based Devices)
-
Phone and Line Interception
-
Recording Devices
-
Infrared or Thermal Surveillance Devices
TSCM Device Sweep
Our Device Sweep analyses smartphones, tablets, computers and other personal devices for hidden spyware or malware that may have been installed to monitor, track, or steal information. Spyware can run covertly on a mobile device and collect a variety of data, including messages, call logs, browsing history, location, and even keystrokes, without the user’s knowledge.
A Protective Group TSCM Device Sweep can assist with detecting and removing the following from your devices:
-
Keyloggers
-
SMS and Call Monitoring Spyware
-
GPS Tracking Spyware
-
Remote Access Tools (RATs)
-
Camera and Microphone Hijacking
-
Account Hijacking
-
Email and Chat Spying
-
Browser Activity Monitoring
-
Data Exfiltration
-
Hidden Apps and Processes
-
Abnormal Data Usage
-
Spyware
-
Backdoor threats
Investigations
We conduct discreet private investigations, surveillance investigations and undercover operations. Our private investigators and private detectives can assist you in determining the validation of an event or process. We will document activities; places visited, and also identify who they are communicating with. In addition, we will obtain video and / or photographic documentation of all activities and of all suspects. You will also receive a thorough investigative report.
Our Private Investigator and Private Detective services have a particular focus on Family Law however we also offer the following investigative channels:
-
Workplace Injuries
-
Elder Abuse
-
Pre-employment Investigation/Background check
-
Financial Abuse
-
Fraud Investigation
-
Skip Tracing
-
Investigation Surveillance
-
Digital Forensic
-
Computer Forensic
-
Cyber Investigators
Have a Question?
Protective Group are proud to have worked with
NSW Government are a client of Protective Group
Go to linkBenevolent Society are a client of Protective Group
Go to linkVictoria Police engages Protective Group The Orange Door
Go to link