High Priority Guide

Client ProtocolWhat to Do if You Suspect Eavesdropping

This is the most important piece of content for a worried client. It is designed to move people from panic to professional action. In the 2026 security landscape, an adversary may remotely wipe a device if they know it is being hunted, so the first 60 minutes matter.

Follow the Indiebim Silent Response Protocol to protect the integrity of the space, preserve evidence, and keep your team one step ahead.

HomeClient Protocol

Silent Response Protocol

First-response discipline determines investigative success.

Reaction Window

First 60 Minutes

Safe Distance

200+ Meters

Trusted Contacts

1-2 People Max

Response Sequence

Follow these steps calmly, quietly, and without improvising.

Each step is designed to reduce the chance of alerting an adversary, preserve evidence, and prepare the environment for a professional counter-surveillance response.

Step 01

The Golden Rule: Maintain Normalcy

Do not alert the adversary. Continue your daily routine as if nothing is wrong. Do not change your schedule or stop holding meetings in the suspected area.

Never discuss your suspicions, the possibility of a bug, or your intent to hire a TSCM firm while inside the suspected location, your car, or near your mobile phone.

Step 02

Establish a Clean Communication Channel

Do not use suspect devices. Avoid your office landline, personal mobile phone, or home Wi-Fi network.

Go off-grid. Leave the suspected area and move to a public park, busy mall, or hotel lobby at least 200 meters away.

Use a safe device, ideally a brand-new burner phone with a fresh SIM card or a trusted device belonging to someone completely outside your professional circle.

Step 03

Strategic Contact with Indiebim

During the initial call, be prepared to provide the size of the area in square feet and the nature of your suspicion.

Avoid key words. Even on a safe line, keep the initial conversation brief and use a cover story if needed, such as a technical infrastructure audit.

Limit the circle of trust. Only one or two people in your organization should know about the sweep because many leaks are internal and advance notice increases the risk of device removal.

Step 04

Pre-Sweep Preparation

Do not search for the bug yourself. Touching a device may destroy DNA evidence or trigger a silent alert that notifies the spy.

Do not use consumer detectors. Cheap handheld spy-finders often emit signals that professional bugs can detect, causing them to go dormant to evade military-grade equipment.

Ensure our team has full access to all relevant areas, including server rooms, electrical closets, and false ceilings, ideally during late-night or weekend dark hours to maintain discretion.

Step 05

If You Find a Device Before We Arrive

Stop and step away. Do not touch it and do not photograph it with a flash.

If you found it accidentally, make a mundane comment such as calling the electrician for a faulty socket tomorrow, then walk away.

Contact us immediately from your safe device and safe location to report that the threat has been physically localized.

Quick FAQ

Frequently Asked Questions