Frequently Asked Questions
HOME - FAQ
What are Technical Surveillance Counter Measures (TSCM)?
TSCM refers to the process of detecting and neutralizing technical surveillance threats, such as hidden cameras, microphones, and other eavesdropping devices. It involves the use of specialized equipment and techniques to ensure the security and privacy of an individual or organization.
Who needs TSCM services?
TSCM services are essential for a wide range of clients, including corporations; local, state, and federal government agencies; hotels where high-profile individuals are in residence, or high-profile meetings occur; entities holding strategic and confidential meetings (boards or senior executives); and anyone who suspects they may be a target of technical surveillance. This includes executives, lawyers, politicians, celebrities, and private citizens.”
How can I tell if I need a TSCM sweep?
Indicators that you might need a TSCM sweep include unexplained noises on communication devices, suspicious behaviour around sensitive information, unauthorized access to secure areas, and physical signs of tampering with electronic devices. See: Signs of covert eavesdropping or bugging.
What locations do you cover?
We are available throughout Australia and internationally. Our head office is in Australia’s national capital, Canberra. We also have an office inVictoria and travel to wherever a TSCM threat requires our services.
How quickly can you respond to a request?
We are able to respond immediately within 24 hours for most urgent requests. It is important to engage us as soon as possible if an incident orsecurity breach has recently occurred. Regular sweeps can usually be scheduled within one or two weeks. If you have a TSCM need let us knowright away so we can include you in our schedule.
How long does a sweep take to complete?
There are a number of factors that can affect the time needed for a professional TSCM inspection. The duration of a TSCM sweep varies depending on the size and complexity of the area being inspected. A typical sweep can take anywhere from a few hours to several days depending on the size of the area to be swept. Such a sweep might consist of three or four offices and conference room. Most of our sweeps are performed by two or three person teams. We may want to include additional technicians to the team if there are specific time constraints.
Other circumstances that may also affect the time could include such things as whether there are many telephone lines to inspect, or if aconference room has elaborate audio and video conferencing equipment. More intensive analysis of telecom systems or AV systems may requirespecial scheduling. Sweeps are usually performed after working hours, such as evenings, or on weekends, when the offices are not occupied, butthis is not our only approach taken. Our threat assessment process can advise you on the best approach to take.
What services are included?
The main categories of a TSCM inspection include:
- Radio frequency spectrum analysis
- Radio signal demodulation, including audio and video
- Wi-Fi cyber inspection
- Cellular signal analysis
- Thermal Imaging detection of covert devices
- Electronic circuit detection using a Non-Linear Junction Detector (NLJD)
- Telecom and data communications analysis of equipment and wiring
- Physical inspection of all areas
- A verbal report will be provided to personnel on site and a full confidential report delivered as required.
All basic inspection areas are covered in every sweep. If you have any specific needs we will discuss these in advance to be sure your concerns are covered.
What equipment is used during a TSCM sweep?
A TSCM sweep employs a variety of specialized equipment (not all of which is mentioned here for operational security reasons), including spectrum analysers, non-linear junction detectors, thermal imaging cameras, and RF detectors. These tools help identify and locate hidden surveillance devices, whether they are transmitting or not.
How often should TSCM sweeps be conducted?
The frequency of TSCM sweeps depends on the level of risk and sensitivity of the information being protected. High-risk environments may requireregular sweeps, such as quarterly or semi-annually, while others may need them only when specific threats are suspected.
What areas are covered during a TSCM sweep?
A comprehensive TSCM sweep covers all areas where sensitive information is discussed or stored. This includes offices, conference rooms, vehicles,residences, and electronic devices such as phones and computers.
Can TSCM services detect GPS trackers?
Yes, TSCM services can detect GPS trackers. Specialized equipment is used to scan for GPS signals and identify hidden tracking devices on vehicles or other assets.
Are TSCM sweeps disruptive to business operations?
TSCM sweeps are designed to be as non-intrusive as possible. Our technicians work discreetly to minimize disruptions and can often conduct sweeps outside of regular business hours if necessary.
What happens if a surveillance device is found during a TSCM sweep?
If a surveillance device is found, our team will document its location and nature, safely remove it unless instructed otherwise, and provide a detailed report. We will take youradvice on how to proceed and we will also offer recommendations for improving security to prevent future surveillance threats.
How can I schedule a TSCM sweep?
To schedule a TSCM sweep, you can contact us through our website, email, or phone. Our team will work with you to understand your needs andarrange a convenient time for the sweep. If you have reached the decision point to undertake a TSCM sweep, we advise that you make contact with us from a neutral location (i.e. do not ring us from the location you believe is compromised as you will alert your adversary).
How should we respond if we identify a technical device prior to seeking
professional assistance?
How to Behave Around Bugs and Wiretaps Special precautions if you suspect bugging or wiretapping:
i. Stay Calm: Avoid panic to prevent mistakes.ii. Contact a TSCM Specialist: Do this immediately and discreetly, preferably via email from a safe location.iii. Use Secure Phones: Call from a secure, non-suspect location. Avoid using cell phones if possible.iv. Schedule Assessments Quickly: Book a vulnerability analysis or TSCM survey as soon as possible.v. Discreet Actions: Avoid discussing suspicions at home, work, or in your car.
What NOT to Do:
i. Don’t Search Yourself: Leave the detection to professionals.ii. Don’t Contact Local Authorities: They often lack the expertise and may dismiss your concerns.iii. Avoid Office and Cellular Phones: Use these only if necessary and from non-suspect areas.iv. Don’t Hire Private Investigators for Sweeps: They may not be qualified and could compromise your security. Always seek confirmation of expert training and qualifications and make sure they do not use cheap sweeping equipment from the internet.v. Avoid Using Bug Detectors: Without proper training, you may miss bugs or cause unnecessary panic.
Additional Considerations:
i. Quick Response: Get a TSCM specialist on-site asal & preserve scene.ii. Maintain Area Security: Keep the area occupied to prevent device removal.iii. Be Cautious with Communication: Ensure the eavesdropper isn’t alerted to your actions.
Special Precautions for Executives:
i. Watch Your Words: Be cautious about discussing suspicions.ii. Use Safe Phones: Make initial contact from public pay phones.iii. Pre-emptive Measures: Establish relationships with TSCM servicesin advance and consider retainer agreements.iv. Plan Ahead: Consider what actions to take if a bug is found (discuss these with your TSCM specialist; think of the stock market and/or media coverage).