Case Studies
Technical Surveillance
Technical Surveillance Counter Measures (TSCM), including Counter eavesdropping, Specialist search and Operational management
Note: Due to the sensitive nature of these operations this is a broad outline without specific details.
Organisations and private individuals have turned to Sceptre and its partners to ensure that their conversations, movements and digital footprint are safe from interception. We offer a highly discreet service to detect technical material embedded in or targeting such places as boardrooms, bedrooms, vehicles and any area deemed vulnerable to unauthorized covert recording.
Sceptre have deployed both within the UK and internationally to various company headquarters and private residences to undertake this service. We have also worked on private yachts and aircraft to detect any intrusive material and ensure our clients’ total privacy.
The detection methodology involves multiple layers of detection to find and identify the broadest spectrum of devices and outside intrusion. Once the technical sweep of a venue is complete and has confirmed the absence of surveillance equipment, the client will have the confidence to undertake confidential business in complete privacy.
When unauthorized technical items are detected, clients are notified immediately to approve their removal if desired, although the option remains to keep the eavesdropping or tracking item in place, so as to feed it false information.
The world of technical surveillance is constantly evolving with new surveillance material regularly appearing on the market. This requires updated detection methods to keep track of it. Sceptre and its partners remain at the cutting edge of detection methodology and knowledge.
Services
Security Consultancy
Bespoke, detailed and proportionate advice and support to identify, mitigate and manage your security risk.
Learn more
Event Security
Protecting both large and small scale events domestically and internationally in diverse threat environments.
Learn more
Technical Security
Technical Surveillance Counter Measures to ensure your communications, both in person and digital, are kept secure.
Learn more
Close Protection
Protection provided by highly experienced close protection staff who have been tried and tested in real world situations.
Learn more
Penetration Testing
Ensure that security systems are fully assessed by independent testers, who will identify any vulnerabilities.
Learn more
Training
High-quality, bespoke and independently qualified security training delivered for both the private and public sectors.
Learn more









