Articles written by Charles Patterson.

$1 million lawsuit against big oil companies for failing to protect employee from covert surveillance.

A civil lawsuit against several large oil companies for allegedly failing to act when a female drill rig engineer discovered a spy cam in her room is one step closer to a jury trial... it is one expensive reason why corporations need to take unauthorized surveillance seriously- and have a professional TSCM sweep team on call.

2018-02-20T20:35:45-05:00February 20th, 2018|

Technical Build-
Portable CCTV System for Executive Protection and TSCM

The Arlo wireless camera system by Netgear is a relatively inexpensive system that it is adaptable for a portable security application. Originally designed for the home market, the system has a number of limitations, but wireless transmission, motion detection, and long battery life make it useful in portable applications where quick deployment is needed.

2017-10-14T10:33:37-04:00December 29th, 2016|

Tech alert: Manipulating phone commands by distorted audio and radio transmission.

Techniques that can hijack “always listening” features.

Electronic Voice Image

by Charles Patterson

The introduction of voice recognition to numerous devices and phone apps adds a new security element to consider. Google Now (“OK Google”), Siri, Cortana, and the Amazon Echo are working their way into our lives. Can voice control be surreptitiously used for […]

2016-12-16T20:23:32-05:00July 16th, 2016|

TSCM Tip: Overcome Glare on the REI Oscor Green/Blue Spectrum Analyzer

The REI Oscor Green and Oscor Blue have a built-in wire stand that tilts the unit to put the screen at a comfortable viewing angle. This is great and works properly much of the time. The challenge is that when there are ceiling lights directly overhead, the angle will often create glare for the operator. This glare can be very difficult to see through. Presented here is a simple extension stand that will give an extra few inches of tilt and help reduce the glare.

2016-12-16T20:23:32-05:00July 9th, 2016|

TSCM Threat: Wireless Camera not detectable by RF or Thermal

When performing a sweep and searching for hidden or covert cameras, two tools that are frequently used are thermal imaging and radio signal analysis. During a recent inspection we came across a unique wireless camera system. The thing that makes these cameras different from other wireless covert cameras is that these are not detectable by rf inspection, wifi detection, or by thermal imaging.

2016-12-16T20:23:33-05:00May 28th, 2016|

Trade Secrets and the Need for TSCM, eavesdropping detection sweeps

Protecting trade secrets and confidential information is key to the success of all corporations. Recently a new bill introduced by Sen. Orrin Hatch, R-Utah and Sen. Chris Coons, D-Del., was signed into law by President Obama. This law is aimed at allowing businesses to sue in federal court for trade secret theft. Such lawsuits previously were left to state courts. TSCM inspections and sweeps are an important step for identifying conversations and meetings as confidential, and that the information being discussed is a trade secret.

2016-12-16T20:23:33-05:00May 20th, 2016|

Covert video: not just voyeurs. Should you be concerned?

There are frequent reports of hidden video cameras found in locker rooms, restrooms, and other private locations. This is a serious issue, but there are many ramifications that should also be considered from the corporate viewpoint.

Erin Andrews won a $55 million lawsuit against the Nashville Marriott after a hotel guest took video of her through the hotel […]

2016-12-16T20:23:34-05:00April 6th, 2016|

Securing the corporate AV system

A number of years ago we began to see corporate AV systems using WiFi control for a number of their components.

During our Cyber TSCM wifi inspections we often find unsecured routers appearing in conference room AV racks. These routers are not usually connected to the corporate network. That may be why the installers did not think it was necessary to secure […]

2016-12-16T20:23:35-05:00January 30th, 2016|

Hacked phone systems lead to credit card fraud

Phone system and voicemail hacking have been going on ever since they were invented it seems. Recent attacks, though, show a new level of complexity and severity.

THEN

In the 80’s hackers would get hold of DISA numbers (Direct Inward System Access- numbers that were often used to allow remote workers make long distance calls on a company’s phone account). These […]

2016-12-16T20:23:42-05:00February 6th, 2015|

Waiting to be hacked… new consumer devices offer new eavesdropping potential.

Internet connected devices are attracting a lot of attention. Many, though, have potential security vulnerabilities just waiting to be hacked.  The following devices may not have been exploited yet… but considering the possibilities, it’s only a matter of time. Some of these just appeared at the CES show in Las Vegas and may not have hit the street yet but […]

2016-12-16T20:23:43-05:00January 12th, 2015|

Darkhotel points to the need for TSCM sweeps to enhance cyber security

The Darkhotel cyber threat highlights the need for corporations to take regular TSCM sweeps seriously.

Darkhotel, so named by Kaspersky Labs, is a malware attack that has been operating at least since 2009, focusing on executives visiting hotels especially in Asia.

A key element in these reports, according to Kaspersky’s research, is that the Darkhotel group often knew a […]

2016-12-16T20:23:46-05:00November 11th, 2014|
Go to Top