Technical Surveillance Countermeasures
HOME - WHAT ARE TSCM
What Are TSCM
Technical Surveillance Counter Measures, or TSCM, refer to methods of protectinginformation and communications against electronic eavesdropping or other forms oftechnical surveillance.
We offer professional bug sweeps and other technical security measures to help protect your privacy and confidential information.
A Technical Surveillance Counter Measure, also known as a “bug” sweep or electronic surveillance sweep, is a highly specialized service that detects the presence of eavesdropping devices such as hidden microphones or “bugs.”
The goal of a Technical Surveillance Countermeasure is to identify existing security breaches and/or potential weaknesses in technical and communications security and to recommend corrective action to neutralize the risks.
What are some high threat business situation's that may warrant a TSCM Sweep?
- Business expansion or reorganization plans are being discussed
- Key executive(s) leave or are leaving
- New products, pricing or marketing plans are being developed
- Acquisitions or mergers are being planned
- Work occurring in a sensitive or high-profile industry
- Executives or clients who are subject to media attention
- There are ongoing labour negotiations, labour problems or union activity
- Where any type of litigation, lawsuit, or other civil action is involved
- Impending layoffs or termination of employees
- Insider threats
Our TSCM Inspection Process: Overview and Procedures.
Summary of Key Phases: Assess the current TSCM measures in place.
1. Initial Consultation and Planning:- Discuss client concerns and suspicious incidents.- Establish inspection objectives and strategies.
- Risk & threat assessment
2. Thorough Visual Examination:- Inspect sensitive areas for surveillance devices.- Utilize advanced tools such as high-resolution CCTV and thermal imaging.3. Technical Inspection:- Use advanced technology to detect non-radiating surveillance devices.- Employ Non-Linear Junction Detection (NLJD) and Spectrum Analysis.4. Information TSCM Survey:- Assess the current security measures in place.- Recommend improvements for overall TSCM posture.5. Debriefing:- Immediate discussion of inspection findings and urgent TSCM issues.6. Final Report:- Provide a detailed briefing documenting findings and recommendations.
7. Final Deliverables:- Where required, deliver a comprehensive report documenting the inspection process, findings, and due diligence (this is an additional cost and usually only required where the client wishes to take further action or present a professional and detailed report to a Board).- Immediate debriefing to discuss critical security issues and client/entity protection strategies. For further assistance or to develop an effective technical surveillance strategy, please contact Peter White at 0404272199, our highly experienced international/national security and business counterespionage consultant. Peter has over four decades of national security and safety experience.
Detailed Procedures:
- 1. Pre-Inspection:
- - Initial confidential discussions about incidents and any surveillance concerns.
- - Walk-through orientation to understand the layout and potential vulnerabilities.
- - Strategy planning based on collected diagnostic information.
- - Threat/risk assessment
- 2. Visual Examinations:
- - Physical inspection of furniture, fixtures, wiring, and small items to detect hidden surveillance devices.
- - Use of tools like thermal imaging, advanced NLJD, X-Ray technology (where required).
- 3. Technical Examinations:
- - Detect non-transmitting surveillance devices using NLJD & thermal imagery.
- - Conduct radio frequency spectrum analysis to identify any anomalies (standard analysis up to 24GHz. At an additional cost, analysis can be
- undertaken up to 110 GHz where required).
- - Optical spectrum analysis to detect infrared and laser light transmissions.
- 4. Internet of Things (IoT) Exam:
- - Examine IoT devices for potential vulnerabilities.
- - Include items such as printers, VoIP phones, and AV equipment.
- 5. Communications Examination:
- - Visual inspection and analysis of system components and wiring.
- - Use Frequency Domain Reflectometry and other advanced tools.
- 6. Wireless Communications Examinations:
- - Analyse Wi-Fi security and compliance.
- - Inspect vulnerabilities in cordless phones, headsets, and other wireless devices.
- 7. Wi-Fi Security and Compliance Audit:
- - Detect covert wi-fi surveillance and rogue devices.
- - Ensure compliance with various security standards and regulations.
- 8. Tamper Detection:
- - Use UV and where required utilise custom seals to detect tampering.
- - Re-examine seals during follow-up inspections.
- 9. Acoustical Ducting Evaluation:
- - Assess potential sound migration through ducts and other pathways.
- 10. Information Survey:
- - Evaluate the effectiveness of existing information/TSCM measures.
- - Provide unbiased recommendations for TSCM improvements.