top of page
Mobile Phone

TSCM Device Sweep

TSCM Device Sweep

Our TSCM Device Sweep analyses smartphones, tablets, computers and other personal devices for hidden spyware or malware that may have been installed to monitor, track, or steal information. Spyware can run covertly on a mobile device and collect a variety of data, including messages, call logs, browsing history, location, and even keystrokes, without the user’s knowledge.

 

Our device is sweep is available on all personal mobile devices such as iPhones, Android device operating systems, laptop, desktop computers and more.


When we check your device for spyware, we detect and remove malicious software and any form of spyware all whilst ensuring your personal information is not compromised.

A Protective Group TSCM Device Sweep can assist with detecting and removing the following from your devices:

  • Keyloggers

  • SMS and Call Monitoring Spyware

  • GPS Tracking Spyware

  • Remote Access Tools (RATs)

  • Camera and Microphone Hijacking

  • Account Hijacking

  • Email and Chat Spying

  • ​Browser Activity Monitoring​

  • Data Exfiltration

  • Hidden Apps and Processes

  • Abnormal Data Usage

  • Spyware

  • Backdoor threats

Protective Group also offers a TSCM Car Bug Sweep and TSCM Home Bug Sweep service.

Explore our various licenses and insurance policies that ensure the highest level of protection for our clients.

We are fully accredited and compliant with industry standards.

A Current Affair | Apple AirTag and how an innocent device can be turned sinister.
ABC News | Technology Abuse | Featuring Protective Group
The Project | Aussies Helping Women Rid Their Homes of Tracking Devices | Featuring Protective Group
ABC Statewide Drive | Technology Abuse | Featuring Protective Group
Channel 7 News | Disturbing ways tech is used to control DV victims | Featuring Protective Group
Protective Group have featured on
Working in Front of Multiple Screens

Equipment we use

  • Specialist Licensed Android and Apple Software

  • PowerSurge Testing

  • Faraday Box if required to work in a controlled environment

  • Specialist Computer Software

  • Malicious Cable Testing

  • MicLocks

  • USB Datablocker

  • Use of advanced Wi-Fi management software that detects the devices connected to the clients home Wi-Fi network, check the Internet speed and security level, and blocks or pauses Internet on specific devices if required

Before your Appointment

It's important to gather relevant information and understand a few key aspects of the client's situation before completing a TSCM Device Sweep.

 

Preparation will help us address the clients concerns thoroughly, carry out the necessary inspections, and provide useful advice or solutions.

Steps we take:

  • Understanding the Client's oncerns and situation

  • Why do they suspect their device and account are compromised?
    What types of activities are they worried about?

    - Any recent disputes or threats?

  • Understand what accounts the client uses

  • Have they noticed unusual behavior?

The person assisting the client will explain the capabilities and limitations of the tools and equipment.

Our team will also assist with any questions that client has.

After your Appointment

At the conclusion of the TSCM Device Sweep we debrief with the client.

Within 24hours of an appointment being completed our team provide a detailed report of our findings, detailing the inspection process, what was checked, and the types of malicious software and hardware that we tested for.


We include details on the equipment's used during the sweep and any specific techniques applied.

Our team also recommend countermeasures and safety recommendations to ensure the client has the understanding to stay as safe as possible and free from any future covert and illegal surveillance.

All Protective Group clients are also invited to use our exclusive and Technolgy Learning Portal

If something was found, we explain what it is, how it works, and where it was located.

Our TSCM Device Sweep detects all types of malicious software and programs:

Keyloggers

  • Keyloggers track and record every keystroke made on the device, capturing sensitive information such as passwords, credit card numbers, or messages. This data is often sent back to a remote server controlled by the attacker

SMS and Call Monitoring Spyware

  • Spyware that intercepts SMS messages and call logs, allowing an attacker to view sent and received messages, listen to phone calls, or track who the user is communicating with.

  • Some spyware can even forward calls or text messages to another number.

GPS Tracking Spyware

  • GPS tracking apps can be installed to monitor a device’s real-time location. These apps can track your movements and report them to someone else without your knowledge.

  • Some spyware also logs location history and shares it with the attacker.

Remote Access Tools (RATs)

  • RATs (Remote Access Tools) allow someone to take over control of the mobile device remotely. This can include accessing the camera and microphone, reading messages, browsing files, or even taking screenshots.

Camera and Microphone Hijacking

  • Certain spyware can gain control of the phone's camera or microphone, allowing the attacker to capture photos, videos, or audio recordings without the user’s consent.

  • Always-on recording: In some cases, the microphone can be used to record conversations happening near the device, making it an effective eavesdropping tool.

Social Media Account Hijacking

  • Some types of mobile spyware specifically target social media accounts. It may steal login credentials for platforms like Facebook, Instagram, or WhatsApp, allowing the attacker to impersonate the user, read private messages, or post on their behalf.

Email and Chat Spying

  • Spyware can intercept email conversations and chat app messages (like WhatsApp, Signal, iMessage, etc.), even if the communication is supposed to be secure and encrypted.

Browser Activity Monitoring

  • Spyware can track the user's browsing history, including sites visited, cookies, and saved passwords. Some spyware may also inject malicious ads or redirect the browser to phishing websites.

Data Exfiltration

  • Some forms of spyware are designed to steal sensitive data like contacts, photos, files, and documents stored on the device. This information can be used for identity theft or financial fraud.

Hidden Apps and Processes

  • Malicious apps may run in the background, hidden from the user’s app menu, and disguised under a different name to avoid detection. They consume resources and gather data in the background.

Battery Drain and Overheating

  • Many types of spyware run continuously in the background, causing the device’s battery to drain faster than usual. Spyware may also result in the device overheating due to the constant activity it performs (e.g., sending data, accessing hardware components).

Abnormal Data Usage

  • Spyware often requires a lot of data to send information to a remote server. Unusually high data usage on the mobile plan can be a symptom of spyware sending information off the device without the user's knowledge.

Other Counter Surveillance Services

TSCM Car Sweep

Thoroughly examine the car for hidden surveillance devices, such as GPS trackers, hidden cameras, or microphones.

TSCM Home Sweep

Thoroughly examine the house for hidden surveillance devices, such as hidden cameras and listening devices.

Investigations

Latest technology and proven techniques through years of personal law enforcement experience.

Have a Question?

Visit our Help Center! Here, you can find answers to frequently asked questions, shipping information, and general details to assist you. If you need further assistance, feel free to reach out!

Support Services

We offer complementary training to our referral partners

Protective Group CEO Stephen Wilson holding GPS trackers and Hidden Cameras

In the Media

View our recent TV and print articles

Protective Group are proud to have worked with

bottom of page