top of page
CCTV Cameras

Counter Surveillance

We use technology to break technology

Disrupting technology abuse is at the core of our business. If you feel that you are being stalked or a victim of malicious spyware, hidden cameras and other forms of illegal surveillance we can assist in detecting and removing these threats.

By partnering with the nation’s leaders in family and domestic violence services, policing, technology, security and government we’re able to put in place tailor made, highly effective risk and safety measures.

​Ultimately, our top priority is to ensure our clients feel safe and secure at all times. a combined 100+ years of operational law enforcement, military and corporate risk management experience, we bring a unique, concentric layered approach to safety and security for our clients.

Protective Group CEO Stephen Wilson holding trackers and hidden cameras
Police holding an Apple AirTag found by Protective Group on a car

Australia's TSCM Leaders

Effective Solutions

Expertise

With a combined 100+ years of experience in safety and security - and a deep knowledge of how perpetrators operate - Protective Group know how, where, and what to look for.

Safety first

While detecting threats is what we do, one thing always comes first - reducing risk. Our assessors are trained to be discrete, diligent, and sensitive to the unique security needs of each client.

Thinking ahead

In the ever-changing threat landscape of technology-facilitated abuse, you're either ahead of the curve or falling behind. That's why we are constantly researching the tricks and tactics used by perpetrators, and always looking for new ways to counter threats.

Equipment

To counter the huge variety of covert surveillance equipment available, we employ a wide array of different technologies and techniques to ensure that every camera lens, microphone, tracking device and spyware app is detected. 

Protective Group Licensing and Accreditation

TSCM Car Bug Sweep

Our Car Bug Sweep service is conducted on a vehicle to detect and remove any unauthorised surveillance devices or bugs. TSCM sweeps are carried out by Protective Group using specialist equipment to scan for electronic eavesdropping devices that might be covertly installed to spy on conversations, track movements, or gather other forms of intelligence.

A Protective Group TSCM Car Bug Sweep can assist with detecting, locating and removing the following covert devices on your car:

  • Listening Devices (Bugs)

  • GPS Trackers

  • Hidden Cameras

  • RF transmitters

  • Bluetooth or Wi-Fi Surveillance Devices

  • Phone Interception Devices

  • Thermal Imaging or Vibration Sensors

TSCM Home Bug Sweep

Our Home Bug Sweep service is conducted on a home to detect and remove any unauthorised surveillance devices or bugs. TSCM sweeps are carried out by Protective Group using specialist equipment to scan for electronic eavesdropping devices that might be covertly installed to spy on conversations, whether it's actively transmitting signals or passively recording data. The sweep typically covers various parts of the home such as living rooms, bedrooms, offices, and any other areas where privacy could be compromised.

A Protective Group TSCM Home Bug Sweep can assist with detecting, locating and removing the following covert devices in your home:

  • Audio Bugs (Listening Devices)

  • Hidden Cameras (Video Surveillance Devices)

  • Wireless Devices (RF and Bluetooth Transmitters)

  • GSM Bugs (Cellular-based Devices)

  • Phone and Line Interception

  • Recording Devices

  • Infrared or Thermal Surveillance Devices

TSCM Device Sweep

Our Device Sweep analyses smartphones, tablets, computers and other personal devices for hidden spyware or malware that may have been installed to monitor, track, or steal information. Spyware can run covertly on a mobile device and collect a variety of data, including messages, call logs, browsing history, location, and even keystrokes, without the user’s knowledge.

 

A Protective Group TSCM Device Sweep can assist with detecting and removing the following from your devices:

  • Keyloggers

  • SMS and Call Monitoring Spyware

  • GPS Tracking Spyware

  • Remote Access Tools (RATs)

  • Camera and Microphone Hijacking

  • Account Hijacking

  • Email and Chat Spying

  • ​Browser Activity Monitoring​

  • Data Exfiltration

  • Hidden Apps and Processes

  • Abnormal Data Usage

  • Spyware

  • Backdoor threats

Investigations

We conduct discreet private investigations, surveillance investigations and undercover operations. Our private investigators and private detectives can assist you in determining the validation of an event or process. We will document activities; places visited, and also identify who they are communicating with. In addition, we will obtain video and / or photographic documentation of all activities and of all suspects. You will also receive a thorough investigative report.

Our Private Investigator and Private Detective services have a particular focus on Family Law however we also offer the following investigative channels:

  • Workplace Injuries

  • Elder Abuse

  • Pre-employment Investigation/Background check

  • Financial Abuse

  • Fraud Investigation

  • Skip Tracing

  • Investigation Surveillance

  • Digital Forensic

  • Computer Forensic

  • Cyber Investigators

Support Services

We offer complementary training to our referral partners

Protective Group CEO Stephen Wilson holding GPS trackers and Hidden Cameras

In the Media

View our recent TV and print articles

Have a Question?

Visit our Help Center! Here, you can find answers to frequently asked questions, shipping information, and general details to assist you. If you need further assistance, feel free to reach out!

Protective Group are proud to have worked with

bottom of page