Technical Surveillance Counter Measures


J.A. LaSorsa & Associates – Founded by a FORMER SECRET SERVICE AGENT, Presidential Protection: providing Technical Surveillance Counter Measures Bug Sweeps nationwide. If you think you need a bug sweep or Technical Surveillance Countermeasures survey, contact us now for a free consultation to discuss your issues and needs.


At J.A. LaSorsa, we utilize technically advanced equipment in order to perform sweeps to identify various types of audio and video interception devices. We utilize state-of-the-art devices to perform radio frequency spectrum searches. We also conduct a complete bug sweep with an infra-red, thermal and laser devices to detect covert transmissions and any audio or video equipment.

Whether your area of concern is a small business, executive residence, corporate apartment, private home or residence, personally owned vehicle, private aircraft, yacht  or even a cell phone  we can perform a professional Technical Surveillance Counter Measures Bug Sweep or Survey to detect illegal devices. Our goal is to detect and eradicate your exposures, help you regain control and security of your environment and to help you prevent future exposures.

Investigations, Consulting, Technical Surveillance Counter Measures Bug Sweeps & Private Security

 Share our iPhone App!

Each year U.S. businesses lose billions of dollars to Corporate Espionage – Cyber Espionage – Industrial Espionage and Economic Espionage tactics used by national and foreign threats. Even private citizens going through divorce or other family issues are susceptible to incredible losses. If you do not implement effective, preventive security measures, you too are a potential victim of espionage. If your business or home is compromised today, how much do you stand to lose? We offer TSCM Bug Sweeps & Corporate Counterespionage services to stop leaks of your confidential information, business strategies, cost and pricing structures, competition sensitive information, contract negotiations, trade secrets and other highly valuable information.

Our TSCM Bug Sweeps & Surveys are professional and technical evaluations including digital, visual, electronic and physical examinations to detect unauthorized audio and video devices. We look for all devices – wireless transmitters (bug), wire & mic tap bug, telephone compromise tap/bug, carrier current bug, micro wireless video device, laser & infrared eavesdropping device, etc.

Discreet and professional, our Electronic Eavesdropping Detection, TSCM bug sweeps are perfectly tailored to meet your needs. Detecting your exposures or consulting you to implement preventive measures and help restore your sense of security are our goals.

Please do not hesitate to contact us for a Technical Surveillance Counter Measures BUG SWEEP. Do not believe you are just being paranoid. A listening device can be made for $8 in electronic parts. Contact Us Now for a free initial consultation or for immediate assistance.


A Technical Surveillance Counter Measures Bug Sweep is usually conducted because of:

  • Suspicion that business or personal conversations are being intercepted.
  • Suspicion of the existence of a listening device.
  • Noise on the telephone lines.
  • Unsolicited telephone repairman visits.
  • Information leaks.
  • Evidence left behind by burglars/intruders.
  • Domestic or business problems.

Initial consultations are always free.

Contact us now for a  discreet and personal consultation.

You can call us at  888-831-0809  or email us at


Certified Protection Professional

ASIS (American Society of Industrial Security) International Certification Board administers the Certified Protection Professional CPP designation program. CPP candidates must meet strict experience and education prerequisites and demonstrate competency in all areas of security management, security solutions and best-business practices. Less than 10,000 of the millions of security practitioners worldwide have earned this accreditation. As a result, the CPP is widely recognized as the highest designation awarded to security practitioners.


“The Quiet Threat: Fighting Industrial Espionage in America”

Industrial espionage is a craft that has evolved over the centuries that remains persistent in its threat. History has shown us that the techniques used today are adaptations of those developed in the sixteenth century and honed through the twentieth century. Accordingly, the text focuses on the similarity of industrial spy craft through time with examples from Anglo-American history. This book will help security professionals to combat industrial (or corporate) espionage in the post-industrial information age by helping to understand its techniques. A primary goal of the book is in giving the reader a real sense of how industrial spies are persistent and clever in circumventing defenses. Another sense the book imparts to the security professional (or the student of security) is that industrial espionage creates paradoxes rather than straightforward, easy solutions. It examines both the defensive and offensive tactics necessary to fight industrial espionage. Living with paradox should be the theme for the security professional, and the book draws wisdom from political philosophers like Machiavelli to aid in that perspective. While the text examines history and discusses security doctrine, it also offers a clear plan of action in dealing with industrial espionage in a fluid, mobile, information-rich business environment. Creating new warriors against the quiet threat is its chief mission.