Private Detective,
Bug Sweep Expert,
Based IN PERTH WA
BPI Perth is a discreet Private Investigation business based in Perth. Client confidentiality is our first consideration. Affordability of services is our second consideration. We have been providing professional standards in both Investigative and Bug Sweeping services for well over ten years in Western Australia. We achieve high client ratings from those who engage our services.
Bug Sweeping Service
Seeking a new challenge, and given his comprehensive investigations background and his Security Science, Computer Security and Technical Surveillance Counter Measures (TSCM) qualifications, our principal James (Jim) Milligan, a former police detective sergeant, retired from the Financial Sector. He obtained an Investigation Agent’s license to provide Private Investigation, and bug sweeping services, trading as BPI Perth.


Since 2012, BPI Perth has engaged with dedicated commitment in the bug sweeping domain to establish leadership in this field in Western Australia. This investment is based on advanced training and experience and draws on our relevant industry qualifications. We have interaction with high profile professionals in the United States and the United Kingdom and continually research contemporary publications to keep abreast with continually emerging spy related technologies.
Our well-established professional service is supported by the following relevant qualifications:
- Bachelor of Science (Security), Edith Cowan University
- Graduate Certificate (Computer Security), Edith Cowan University
- Diploma in Technical Surveillance Counter Measures (Bug Sweeping) Vanquish United Kingdom
- Certificate 4 in Motor Vehicle Logistics
- Master’s Degree in Criminal Justice from University of Western Australia
BPI Perth conducts Technical Surveillance Counter Measures inspections of Commercial facilities, residences, motor vehicles and aircraft. We are generally able to respond promptly to service requests. We have provided services to top tier resource companies, a diverse range of business operations, high net worth individuals and a broad profile of residents generally.
We have invested substantially in the bug sweeping domain to establish leadership in this field in Western Australia. This investment includes advanced training and drawing on our relevant qualifications in this field. We liaise with high profile professionals in the United States and the United Kingdom to keep abreast of continually emerging spy related technologies.
Jim Milligan attended a five-day information security related conference in Florida, U.S.A. He there interacted with many international delegates and established useful relationships.
We do not use cheap, gimmicky bug sweeping equipment. Our investment, in addition to qualifications, continuous information exchange, and training includes our credible array of specialized detection instruments. We use two Spectrum Analysers, one of which extends to 26.5 GHz in range. We have instruments produced in the United States, England, Germany and Russia. They include radio frequency detectors specifically covering 2 G, 3 G, 4 G and 5 G and extending out to 14 GHz frequencies, including (and not limited to) WI-FI, Bluetooth, Low Energy Bluetooth and microwave.
To the astonishment of several clients, our non-linear junction detector has identified tiny electrical circuits through brick walls. This capacity is operationally critical where an eavesdropper has remotely switched a device off so that it ceases to emit a detectable radio frequency.
Our thermal camera has an industry recommended sensitivity of minus 60 millikelvins and has many useful detection applications such as identifying hot spots in ceilings, behind works of art and in lounges, cushions, stuffed toys etc. We have identified active spyware in mobile telephones that have been switched off and given time to cool to room temperature.
Our associate in Western Australia is internationally recognized in the field of Digital Forensics. We work closely with him when complex issues related to mobile/cell phones and computerized systems confront us. Spy software installed in mobile telephones and computers is becoming an ever-increasing threat to users. Offenders are able to remotely take over most of your telephone functions, even when your phone is switched off, and from almost anywhere (in the range of a cell-tower) on planet Earth.
Some Bug Sweeping Case Studies
Hearing voices?
During a recent commercial radio interview, BPI’s Principal technician was asked about interesting bug sweeping inspections. One particular matter came to mind.
A mature woman who lived alone in a two-level residence in an affluent location telephoned BPI Perth. She had just returned home following a visit to a psychiatrist. She had been referred by her concerned son and daughter.
The elderly woman had informed her son and daughter that she had been hearing a man’s voice in her two-level residence during some afternoons. Given that she lived alone, this caused her fears for her safety.


We responded post haste and set about a structured technical surveillance counter measures inspection after searching both the lower and upper levels for any signs of the mystery man. The instruments were unpacked and prepared for use. The ground level was found to be absolutely clear of any possible threats. We moved on to the upper level. That’s when it became very intriguing.
During the course of scanning the upper level, a good quality radio frequency detector, monitored with headphones was introduced to an office/study area. Within a few minutes a reasonably strong radio frequency presented on the monitor. Applying direction finding techniques, we were able to find the greatest signal strength alongside an air conditioner mounted on a wall. It was then that a man’s voice became audible through the headphones.
The client was summoned and the headphones were given to her. “That’s him. That’s the voice. See I’m not going mad.”
The voice was coming out of an electrical wall socket used to power the air conditioner!!
Further focus on the voice identified it as a radio announcer, presenting his scheduled afternoon broadcasted session.
Now how could this be? A wall socket transmitting commercial radio!
As a follow up and aligning with our commitment to continuous education, we contacted the English manufacturers of our radio frequency detector to learn that this was a known, but rare occurrence.
We were informed that it was likely that there would be two kinks in the cable running from the wall socket to the electrical meter box. Somehow the distance of the kinks apart created a basic antenna receptive to a particular commercial radio frequency and our instrument detected it in the form of a man’s voice.
We have since our enlightenment, detected radio broadcasted voices and music flowing out of power points in two or three other houses.
Multiple trackers – Low Energy Bluetooth
We were not so long ago contacted by a woman who suspected that her motor car was being tracked. She had been in a failed relationship with man.
Soon after arrival our instruments were deployed in the close proximity of the woman’s motor vehicle. A sweep of the vehicle interior revealed a very weak Bluetooth signal.
However, an inspection underneath the rear of the vehicle substantially strengthened the Bluetooth signal (2.5 GHz). Wearing surgical gloves, time for a close fingertip search.
We located and retrieved five (5) active Apple Air Tags that had been taped under the rear bumper. Never before had we seen so many tracking devices deployed to one motor vehicle.
The air tags were photographed in situ and then removed. From serial numbers inside the air tags, we were able to achieve a good indication about the identity of the alleged perpetrator.
Teddy bear
A search of a vehicle with a quality radio frequency detector revealed a frequency likely emitted by an Apple Air Tag, Samsung Tile or one of the many other low energy Bluetooth trackers on the market. The signal was slightly stronger in the front of the cab than the rear seat area, although the strength difference was barely discernable.


We searched every possible part of the vehicle. Inside the dashboard, under and within the front and rear seats, in the engine compartment and the rear boot. All cavities and recesses were searched. We almost turned the vehicle inside out. Where was it? We had to find it. We knew it was close by, but where? That’s when we focused on a miniature Teddy Bear placed in a recess on the console in front of the gear lever.
With the bear taken out of the vehicle, the signal was gone. The instrument however when positioned close to the bear, ten meters away from the car, indicated the presence of a tracking device.
An Apple Air Tag had been inserted into the Tiny Teddy bear through a small slit and the slit discreetly sown up. There was just enough space within the small bear to accommodate the Apple Air Tag.
A quick solution
We were deployed to the suburban premises of a construction related firm to conduct a bug sweep. The company occupying the premises had submitted many construction related tenders and in some cases for hundreds of thousands of dollars in value. However, despite their sound credentials they rarely were successful. They were often beaten by the same competitor by a relatively small margin.
We were briefed by a senior administrator and literally within fifteen minutes our non-linear junction detector located a sophisticated GSM listening device in a power board supplying power to the administrator’s bar fridge. The device had likely been in place for several years and was positioned in the room where conversations about various tender offers took place.
Improvised bug
A young woman separated from her husband was concerned that her movements were being monitored. She had been away on a short break with a companion and suspected her activities were being monitored.
BPI Perth were summoned to conduct an electronic sweep of the woman’s luxury motor vehicle which was parked at her companion’s home. An effective radio frequency detector supported by our non-linear junction detector and a probing fingertip search located a mobile telephone with two power-banks strapped to it, taped into a deep cavity well out of sight in the rear trunk area of the vehicle.
We believe that the device was set to receive and transmit conversations within the motor vehicle as well as provide vehicle location details. The client was shocked, yet relieved that we had located the improvised bug.
Spy camera in Air conditioning vent
An inspection of a residence in Perth’s metropolitan area was requested by a woman whose husband had left her for another woman. He had access to the residence for several months after the separation before our client had a locksmith change all of the door locks and re-program the external CCTV security cameras.


During our inspection of the main lounge room, our camera lens detector identified the reflection of a CCD chip supporting a functioning camera lens. Closer examination verified that the reflection sourced from a spy camera covertly placed inside an air conditioner ventilation grille.
We explored the cabling connected to the camera and found another camera fitted within another air conditioning vent, in the master bedroom. A bundle of cabling, two covert cameras and transmitter were removed from within the ceiling.
Smart systems and a smart eavesdropper
A woman who had been separated from her husband and living apart for about 12 months was suspicious of her tech savvy husband and his potential to have bugged her house to eavesdrop on conversations therein or monitor their movements.
The suspicion was heightened when the woman and her child daughter for the first time in six months had just finished watching a Netflix movie when her estranged husband telephoned. He wanted to speak with his daughter. When he did, his first comment was, “Seen any movies lately?” This occurrence put our client on guard.
We undertook a comprehensive physical and detection-instrument inspection of the residence and grounds. When queried about smart speakers in the home, the woman informed that her estranged husband had remote access to her smart IOT enabled air conditioning installation. He could therefore remotely monitor a whole lot of information about activity within the residence such as knowing when the house was likely occupied.
Smart speaker privacy controls can be deficient. With the concordance of our client, and for her peace of mind, we switched off the WI-FI component to break the link between the controller and the home systems router so that private information could not be transmitted to locations outside the residence.
Bpi Investgations Capacity
Our experience in the Investigations field however goes back many years. More than ten years before becoming a licensed Inquiry Agent and Private Investigator. Our principal James (Jim) Milligan was a police officer for 22 years, 15 of those years serving as a detective and detective sergeant.
Additionally, Jim, holds a Master’s Degree in Criminal Justice from the University of Western Australia.
Whilst attached to the W.A. Police Arson Squad, Jim Milligan was seconded to the National Crime Authority’s Melbourne multi-jurisdictional task force for three years and was there sworn into the Victoria Police for that term. He was involved in the investigation and prosecution of the highest-levels of organized crime. He was then a detective first class sergeant and conducted investigations in Victoria, South Australia, New South Wales, Western Australia and Queensland.
Jim is mentioned in the highly acclaimed publication, authored by Justine Ford, “The Good Cop” from when he worked together with prominent Victoria Police detective sergeant Ron Iddles. They were investigating a high profile organized crime figure in New South Wales who was subsequently prosecuted and imprisoned.
After returning to the Criminal Investigation Branch of the Western Australia Police, Jim was successful in selection for appointment to the newly established Internal Affairs Division as an Inspector, however at that very time had also been successful in an application for a senior administrative position in a prominent financial sector institution. He resigned from the Western Australia Police Force to accept a new and rewarding challenge.
The then assets of the financial institution were valued at above 2.5 billion dollars. Jim stayed on for a further 22 years as a manager and later, general manager of an investigations and asset protection division, principally responsible for the investigation and referral of suspected fraudulent matters to the Criminal Justice system for prosecutorial assessment. He was also a member of the organisation’s Executive.
Jim has conducted research and investigations overseas. In a government investigator capacity, he has been involved in formal meetings and liaisons in the United States, Canada and the United Kingdom. He met with attorneys at the United States Department of Justice, visited the United States Secret Service, FBI, NYPD, New York Insurance Frauds Department, Ontario Provisional Police, Royal Canadian Mounted Police and the City of London Police Economic Crime Department.
BPI Perth undertakes the whole range of private investigations including surveillance operations into suspected infidelity. We trace and locate missing persons and debtors.
Our rates are surprisingly competitive and client confidentiality is assured. Call us on 0404227972 for a free telephone consultation.

CAUTION
When seeking an obligation free quotation for Bug Sweeping services, be sure to call BPI Perth from a secure telephone and not from within your residence, commercial offices, motor vehicle, aircraft or vessel that may be already compromised.