Your peace of mind is our concern


Our Company

In ScanTek TSCM we care and protect your privacy, your information and your critical systems.

We detect, locate, and remove all kind of audio bugs, hidden cameras, recorders and GPS trackers. We also make your meetings safe and private by means of electronic protection equipment. Know what we can do to protect yout interests.


Áreas & Keys.

We are professionals in intelligence, electronics and communications fields. Appart from that, we are private investigators, security managers, and qualified security trainers. Know our most important keys that makes the difference.


Our training is universitary, (Naval Radioelectronic Engineering, B.Sc), widened with postgraduate degrees in design and implementation of networks (Cisco Systems) and supplemented with specific training in mobile cybersecurity (INCIBE), which allow us to have a global view of almost any threat.


We have more than eleven years of experience in telecommunications multinational corporations, as part of technical projects (implementation, deployment and operation) of nationwide security and safety networks. We also have experienced staff coming from the intelligence community.


Our TSCM Audits are not only focused exclusively on locating and removing all kinds of technically-sourced attack vectors, but we also examine site location, structure and business operations prior to the TSCM works, in order to obtain a global view of the problems and apply appropriate solutions.


We have specific and specialized technical equipment for TSCM audits, but we also make extensive use of professional range, lab-grade equipment, that allows us to detect, isolate, report, and characterize all types of signals in nearly any way capable of transporting information.


In addition to our technical training, we also have professional qualifications as Security Managers and Private Investigators. We carry out, if required by our clients, a meticulous assessment of security risks - technical, human and organizational - that are usually associated with static or "in motion" scenarios.


Our vision is not only active, locating technical attack vectors, but we also act pre-emptively and reactively, creating safe spaces and rooms protected from surreptitious audio recordings and hostile transmission of radio frequency signals that could seriously compromise your corporate interests and privacy.


Our means & instruments.

These are just a part of the different techniques and means that help us to locate, isolate, characterize and neutralize technical-driven attack vectors.

Radio frequency spectrum analysis

By using professional and lab grade, realtime spectrum analyzers, we can capture and analyze even the most weak and short radio signal. No matter what kind of technology is being used to modulate: frequency hopping, bursting signals, etc. Contact Us

Infrared termography

With infrared spectrum analysis we can detect and find thermal fingerprint of hidden devices when they are powered and in service. Contact Us

Non linear junction detection

Using this kind of devices called "non linear junction detectors" is possible for us to find hidden electronic devices containing semiconductors (even in they are not working or not powered), when they hidden inside a wall or any kind of furniture.. Contact Us

Network & line inspection

Network cables and telephone lines are the most useful vector to transmit and exfiltrate information. We use lab-grade equipment to detect, locate and characterize all kind of hostile signals in almost all kind of cables no matter if they are powered or in service. Contact Us

Media cleaning

ScanTek TSCM has a professional audiovisual post-production laboratory for photo, video and audio cleaning. We only use standard and market-leading film software, operated by professional engineers and technicians with extensive experience Contact Us

Cyber TSCM

We have the most advanced software and hardware designed to analyze network protocols. Not only we can detect hidden devices and bugs, but we also control and intercept network traffic in search of software driven suspicious activities. Contact Us

Our key

"Our training and equipment makes the difference. But, avobe all, our dedication and discretion."

Messaging & Social.

Secure messaging platforms & social media.


Send us a free consultation.

Don't forget to contact us by using safe equipment in a controlled environment you trust.

Send us a message
I've read and accept this site's legal terms.
Your message has been sent. Thank you.
Contact information
where we are

Camino de Ronda, St.
Granada, Andalucía
18003, Spain

Montgo Str.
Torrent, Valencia
46900, Spain


Call us

Tel: (+34) 644 40 00 30
Threema ID: PJRN8TTM