
Technical Surveillance Counter Measures
Protect your privacy. Verify your space. Eliminate threats.
Centurion Protection Services performs professional TSCM (bug sweeps) for homes, offices, vehicles, and executive travel—using industry-standard methodology, documented reporting, and seasoned law-enforcement expertise.
How We Conduct Operations
Services
Add a general description of the items listed below. You can introduce the list and include any relevant information you want to share. Double click to edit the text.
Telecom & Telephone Line Analysis (TALAN)
Detect hooks, splits, and handset/base compromises; validate analog/digital lines and PoE devices.
Corporate Offices & Boardrooms
Secure conference rooms, executive suites, and comms closets with RF mapping, physical inspection, and telecom validation.
Vehicle Tracker & Bug Detection
Locate/neutralize GPS trackers, OBD/12-V taps, stash-point recorders, and Bluetooth beacons without damaging OEM systems.
Law Firms & War Rooms
Protect privilege. We clear strategy spaces and verify phones/network paths; evidence handling suited for litigation.
Network & Wi-Fi Exposure Check
Hunt rogue APs, unsecured IoT, and bleed-over signals; deliver quick hardening steps that fit your environment.
NLJD & Powered-Off Device Detection
Find electronics even when silent using non-linear junction detection and targeted physical search.
What We Actually Do
A Centurion sweep is a layered examination of your environment. We begin with a confidential intake to understand who might target you and why. Then we establish an RF baseline and map live transmissions across the spectrum, hunting for anomalies others miss—burst transmissions, frequency-hopping devices, and hidden beacons that masquerade as everyday electronics.
​
While instruments run, we execute a meticulous physical inspection: ceilings, fixtures, outlets, furniture, décor, vents, vehicles. We open what needs opening and trace what needs tracing. We examine telecom and low-voltage wiring, verify telephone and network integrity, and use non-linear junction detection (NLJD) to locate dormant electronics—even when they’re powered off. When DVRs or recorders are in play, we follow examiner-level procedures to review, preserve, and export data appropriately.
​
At the end of the sweep you’ll get a same-day verbal brief and a written report within 24–72 hours: findings, photos, RF logs, wiring notes, and clear remediation steps. If we discover a device, we neutralize it and—if you’re considering legal action—preserve evidence under chain-of-custody.
-
Confidential intake: threat model, who/why, spaces that matter.
-
RF baseline & spectrum map: log live transmissions; flag anomalies (burst, hopping, hidden beacons).
-
Meticulous search: ceilings, fixtures, outlets, furniture, décor, vents, vehicles—open/trace as needed.
-
Wiring & telecom validation: inspect low-voltage runs; verify telephone and network integrity.
-
NLJD sweep: locate dormant/ powered-off electronics with non-linear junction detection.
-
DVR/media handling: examiner-level review, preservation, and exports when recorders are present.
-
Same-day brief: on-site summary of findings.
-
Written report (24–72 hrs): photos, RF logs, wiring notes, and prioritized remediation steps.
-
Remediation & evidence: neutralize devices; preserve under chain-of-custody if legal action is anticipated.
Meet the Team
This is your Team section. Briefly introduce the team then add their bios below. Click here to edit.



