What We Do
If you have any suspicion that you have been bugged, you should contact us using the from ASAP. Please be as discrete as possible and avoid raising any suspicion that a bug is suspected. It is possible that the device may be collected prior to the search, and some higher-level devices even have the ability to destroy themselves.
​
Additionally, some cheaper devices run off battery power, and the highest chance of a find comes if a device is actually functioning. A working device also allows for more analytics post-find, to help in identifying both the scale of the surveillance, and possibly the person(s) responsible.
​
You should keep the people you tell to an absolute minimum. In a home/domestic environment, even the most supportive family members sometimes inadvertently disclose information to the wrong person, either through a mistake or sometimes temper/vengeance. In a corporate environment, it is even more critical. Don't discuss it at meetings!
​
We offer a variety of services to find bugs, all searches incorporate the below as a minimum
-
Technical search (such as RF monitoring)
-
Physical search
-
General counter-surveillance advice, or defensive 'good practice'
​
Different levels of searches are offered for different levels of risk. We can go from as little as 'eyeball only', right up to pulling carpet up. It is important that you are as honest as possible, so we can offer you the correct service at the most sensible price. A private investigator is likely to have a very different skill-set to a jealous ex-partner, so it is important that you provide us with as much information as possible.
​
Some typical examples of searches I might carry out include:
-
A vulnerable person(s) suspecting they are at risk of abuse and/or domestic-violence from an ex or stalker
-
Protection from corporate espionage
-
Protection from journalism/press for high-profile individuals
-
Voyeurism in bathroom/changing areas
-
High-value vehicles being fitted with an illicit tracking device for future theft
-
Suspicion or knowledge of a private investigator being used against you
​
Sometimes customers don't have a particular identified threat, but just want peace of mind for their own sanity, or some corporate customers incorporate such searches into their usual security routine. Some customers like to have these searches done before sensitive meetings, for example. Others like to have a monthly/timetabled sweep of high-risk areas.
​
I operate with full confidentiality, and vehicles and clothing are casual and unmarked. I can discuss cover stories with customers, and show up using a legend. This is particularly important for corporate customers with a reception area.
Personal details about customer cases are never disclosed. Necessary files are securely stored, and unnecessary files are destroyed after the search.
​​
​