
In a world where technology fits in the palm of your hand, the line between public safety and private violation has never been thinner. The recent arrest of Jason Machado, 40, of Hamilton, serves as a chilling reminder that the most intimate spaces of our lives—our bedrooms, bathrooms, and private rentals—can be compromised by those with the patience to watch from the shadows.
On May 2, 2026, the Hamilton Police Service was contacted by a witness who made a disturbing discovery: a collection of video recordings depicting individuals in private settings without their knowledge or consent. This discovery led to the arrest of Jason Machado, a man whose alleged activities span nearly twenty years.
According to investigators, the recordings date back as far as 2007 and continue through 2025. Machado has been charged with three counts of voyeurism, though police suspect the number of victims could be significantly higher. The sophistication of the equipment seized suggests a methodical approach to privacy invasion, utilizing concealed recording devices placed in locations where people had a reasonable expectation of privacy.
Hamilton Police have released Machado’s photograph to the public, urging anyone who may have had contact with him in private circumstances to come forward. The case highlights a terrifying reality: a perpetrator can record for years, amassing a digital library of violations, before a single mistake or a stroke of luck brings the operation crashing down.

When news of predators like Machado breaks, the immediate reaction is often a sense of vulnerability. How do you know if the Airbnb you just booked is truly private? How do you ensure your place of business isn’t bugged by a competitor?
This is where professional Technical Surveillance Counter-Measures (TSCM), commonly known as bug sweeps, become essential. As a Licensed Private Investigator with over 33 years of experience, I, Raymond Ranno, have seen the evolution of spy tech from bulky tape recorders to 4K WiFi-enabled devices hidden inside coffee cup lids.
Locating these devices requires more than just a flashlight and a keen eye; it requires a systematic, multi-layered approach using specialized equipment.
The first step is always a meticulous physical search. We look for “the out of place.” This includes:
Small pinholes in smoke detectors, picture frames, or electrical outlets.
Unusual wiring trailing into walls or behind furniture.
New or moved items that weren’t there previously (clocks, lamps, or air purifiers).
Most modern hidden cameras and “bugs” are wireless; they transmit data via WiFi, Bluetooth, or cellular signals. Using high-end RF Spectrum Analyzers, I scan the environment for unauthorized transmissions. If a device is “bursting” data to a nearby receiver or uploading to a cloud server, the analyzer will catch the signal, allowing us to triangulate its exact location.
This is the “gold standard” for professional sweeps. An NLJD can detect electronic components—diodes, transistors, and circuit boards—even if the device is turned off or the battery is dead. This allows us to find “dead” bugs or dormant cameras that are waiting to be remotely activated.
Every electronic device generates heat when powered. Using FLIR thermal cameras, we can identify “hot spots” inside walls or objects that shouldn’t be drawing power. Additionally, we use specialized optical tools that emit a specific frequency of light; this light reflects off the curved surface of a camera lens (even a pinhole lens), creating a bright “glint” that betrays its position.
The Machado case suggests that voyeurs target “private settings.” In my practice, we focus on several high-risk areas:
Private Residences: Often targeted by disgruntled ex-partners or stalkers.
Hotels and Airbnbs: Short-term rentals are unfortunately common sites for “peeping Tom” devices hidden in alarm clocks or shower heads.
Businesses: Corporate espionage often involves hidden microphones in boardrooms or executive offices.
Changing Rooms and Restrooms: As seen in numerous legal cases, these remain primary targets for voyeurs.

The arrest of Jason Machado is a victory for justice, but for the victims, the damage of nearly 20 years of recordings is immeasurable. Privacy is not a luxury; it is a fundamental right.
If you have a “gut feeling” that you are being watched, or if you occupy a high-stakes professional environment, do not rely on “DIY” bug sweep apps, which are notoriously unreliable. Professional intervention is the only way to ensure your environment is truly secure. At Ranno Investigative Services, we utilize the same high-tech tools—GPS trackers, hidden camera detectors, and cellular forensics—that the perpetrators use, but we use them to restore your peace of mind.
Don’t wait for a “witness” to find a recording. Be proactive, be aware, and stay protected. If you think you’re home or office may be “bugged”, contact Ranno Investigative Services, Investigator Ranno, (860) 305-7640, who can perform a full sweep of your location.