top of page
Group 47720.png

RAGING WAVES

Technical Surveillance Countermeasures (TSCM) addresses the problem of unauthorised electronic surveillance. This covert monitoring can take various forms, such as hidden cameras, audio bugs, GPS trackers, and compromised computer systems. These devices may be used to steal sensitive information, infringe on privacy, or gain an unfair advantage. A TSCM sweep aims to detect and locate these devices, neutralise the threat, and restore security. The issue that a TSCM sweep tackles is the vulnerability to unwelcome electronic eavesdropping and monitoring.

SECURITY
SERVICES

Proven Experience

Знімок екрана 2025-08-27 о 14.45.22.png

Former British Special Forces with 15+ years of operational experience in high-risk environments. Trained and skills proven in counter terrorism, counter surveillance, counter intelligence & private security experience predominantly with multiple Embassies and other diplomatic entities as Team Leader and running projects

Certified Experts

Знімок екрана 2025-08-27 о 14.45.30.png

Certified specialists:

  • CompTIA Network +,

  • CompTIA Security +,

  • CEH Ethical Hacking V12

  • Prince2 Foundation,

  • Prince2 Practitioner 

  • Business Management and Finance.

Trusted Security

Знімок екрана 2025-08-27 о 14.45.38.png

Full confidentiality and use of advanced detection equipment.
Will provide Risk assessments

Provide Certification after job completion

What Is TSCM?

Modern smartphones accumulate more than just dust — hidden risks, unauthorized access points, and compromised data ports may put your personal or corporate information in danger. I perform precise physical and digital "sweeps" to restore device integrity and eliminate vulnerabilities.

Risk Assessment

Before every sweep, I analyze potential threats:

  • Physical obstructions (dust, debris, corrosion)

  • Signs of tampering or unauthorized device access

  • Risk of data leakage or hidden trackers
    Each sweep includes a basic threat profile tailored to your device and usage context.

Certification

After completion, you receive a signed Sweep Certification Report confirming:

  • Cleaned and inspected components

  • Verified port functionality

  • Absence of external interference
    Ideal for organizations requiring traceability and digital hygiene compliance.

Counterintelligence Training

Need more than just cleaning?
I offer tailored sessions in counterintelligence awareness:

  • Spotting social engineering attempts

  • Safe use of mobile devices in sensitive environments

  • Physical habits for maintaining operational security (OpSec)

BECOME
A PARTNER

$1000 / day

For full-day engagements including full sweeps, risk assessments, reports, and counterintelligence advisory. Ideal for corporate clients or in-depth security cases.

Bespoke pricing for smaller jobs, prices on request.

Complete Protection Against
Surveillance and Eavesdropping

MONTHLY SUBSCRIPTIONS

Bronze

Individuals:
- small studio / 1-bedroom apartment
- hotel room
- single vehicle

One sweep per month, basic report, security recommendations

$1,500 / per month 

Silver

Small businesses or families:
- larger apartments
- 2 offices
- 2 vehicles

Two sweeps per month, extended report, security consulting

$2,500 / per month 

Gold

VIPs or companies:
- full house
- large office space
- multiple vehicles

Two Silver-level sweeps per month, meeting room checks, priority scheduling

$5,000 / per month 

bottom of page