Bug Sweeps

Helping You Keep Your Conversations Private

  • Business Intelligence
    Business Intelligence

    Helping You Stay On Track Making Money

  • Family Law Investigations
    Family Law Investigations

    Divorce, Child Custody & Family Law are Messy. We'll Clean It Up.

  • Process Service
    Process Service

    For Those "Hard To Serve" Individuals...

  • Background Checks
    Background Checks

    When Google Just Doesn't Cut It.

  • Mobile and Stationary Surveillance
    Mobile and Stationary Surveillance


AEGIS Security & Investigations specializes in high end, customer service focused security, investigative, training, and consulting solutions. Since our inception in 2007, our goal has been to meet and exceed our client’s expectations. We accomplish this by actively utilizing both internal and external active management techniques and focusing our services tuned to our clients’ hierarchy of needs, resulting in a high quality service our clients and employees appreciate and respect.

AEGIS Security & Investigations conducts tactical surveillance counter-measures (TSCM), also known as bug sweeps, debugging, and eavesdropping detection services designed to provide our clients with peace of mind that their conversations and information remains private. Our expert private investigators conduct a full bug sweep by analyzing and investigating multiple methods to eavesdropping. We have located hundreds of devices designed to provide intelligence to those listening on the other end.

  1. Our bug sweep may begin with a spectrum analyzer searching for signals emitting from the target area outside of the normal commercial spectrum. This device detects the difference between cell phone transmissions, cordless phones, laptops and bugs transmitting wireless signals.
  2. Second, the target area is examined for physical evidence of devices, tampering, and hidden camera lenses.
  3. Third, the target area is examined manually with a wide band receiver designed to pick up any devices that could have been missed by the spectrum analyzer. These devices range from 50kHz to 12Ghz and are designed to go various distances, typically point to point.
  4. Fourth, the target area is checked for devices that are capable of recording and locally storing audio and video (if necessary).
  5. Fifth, electrical outlets and phone lines are examined for carrier currents that would permit listening through electrical lines. This kind of current can easiest be identified as similar to that of a DSL connection using phone lines for data.
  6. Sixth, a non linear junction detector may be used to locate electrical components of devices whether they are on or off. Some bugs can be set to have burst transmissions or only operate while it is picking up voice or video. This allows us to pick those devices up during our TSCM bug sweep, even when they are off.
  7. A cursory sweep of the computer hardware is conducted to check for any suspicious devices.
  8. Last, a phone analysis conducted in conjunction with a physical examination of the phone system to detect phone tapping.

Additional services include computer and IT security, hardening against viruses, trojan horses, worms and key loggers. We provide custom solutions created for each client. Our goal is to provide a high return on investment by providing high quality, efficient, and effective services, exceeding our client’s expectations.

Clients may include:

  • Individuals and families
  • Corporations and businesses
  • Attorneys and law firms
  • Companies with proprietary information
  • Financial management companies

AEGIS Security & Investigation: Our mission is to identify, meet, and exceed our clients’ security, investigation, training, and consulting expectations.