About Charles Patterson

Charles Patterson is the president, CEO, and primary consultant of Exec Security TSCM. He began working in the security field in 1978 in executive protection and related technical security services. He has been providing TSCM sweeps since 1995.

CISO pleads guilty to sharing confidential discussions.

Loss of control of confidential information is a big deal. It can happen in many ways, deliberate espionage using wiretapping, bugging, and cyber breaches are a few methods that are commonly recognized, but there can be many more serious vulnerabilities. Learn how TSCM helps to protect confidential information.

2023-03-29T10:50:28-04:00March 25th, 2023|

Spy Balloons and TSCM- Do you have a Domain Awareness Gap?

When you first heard of the detection of the spy balloon, did you think “I’m glad this doesn’t affect my security department…”? If so, you may be mistaken. There is clearly a “domain awareness gap” in information security. It is the role of TSCM, Technical Surveillance Countermeasures, to help fill that gap. Click to read more on how TSCM looks carefully and meticulously at the gaps in information security that exist between physical, cyber, and other security areas.

2023-03-09T09:36:18-05:00March 8th, 2023|

School administrator planted “spy pen” in a closed meeting.

Another episode of "Thinking of Eavesdropping? -- Don't Do It!" Throughout the TSCM industry, reports of eavesdropping devices being discovered are often found to have been placed by executives or other trusted individuals who feared that they may be fired or passed over for a promotion. They typically want to know what is going on behind the closed doors of a meeting they were not invited to. This case appears to fall into this category. 

2022-05-07T08:58:12-04:00May 6th, 2022|

Lawyer and client sued for eavesdropping.

Another episode of “Thinking of Eavesdropping? Don’t Do It!”

PIERRE, S.D. (KELO) — The South Dakota Supreme Court says an invasion of privacy claim shouldn’t have been dismissed in favor of the defendants involving recordings that a wife secretly made to use against her husband in a divorce case.

Justice Janine Kern wrote the unanimous decision in Gantvoort v. Ranschau that the state’s high court released Thursday.

Doug Gantvoort sued his former wife, Mary Ranschau, and her attorney, David Strait, after Mary hid a recording device in the office that Gantvoort used at their Clear Lake business and where he sometimes spent nights.

From the court details:

Doug Gantvoort (Doug) sued his former wife, Mary Ranschau (Mary), and her attorney, David Strait (Strait), after Mary placed a hidden recording device in Doug’s office during their tumultuous divorce. Strait accepted fifty-one recordings that Mary made of Doug, saved them onto his computers, and attempted […]

2022-04-30T10:09:11-04:00April 30th, 2022|

American Idol winner, Laine Hardy, arrested for eavsdropping.

“How to damage your career in one easy lesson.”

For those thinking of eavesdropping… best advice: Don’t Do It!

Country singer Laine Hardy was arrested Friday on a charge of eavesdropping. Hardy, who won Season 17 of “American Idol” in 2019, turned himself in to the Louisiana State University police after his ex-girlfriend found a recording device planted in her dorm room, according to Baton Rouge ABC affiliate WBRZ TV.

A warrant was filed for the 21-year-old musician after the victim found a recording device under her bed at Azalea Hall back in February. She told police the device first […]

2022-04-30T09:20:59-04:00April 30th, 2022|

Are tech employees leaving and going to competitors?

Keeping loyalty among employees can be a difficult challenge, but may also be critical to survival of your business as well as stopping leaks, spying, and other forms of corporate espionage.  Often requests for our corporate TSCM service come when a well placed employee in a tech position has left the company. Even those without any sort of grudge may still have access to confidential information. Those who may fit the “disgruntled” category may pose even greater threats.

A recent ZDNet article suggests that tech workers are more inclined to leave their jobs than those in other industries. 

“As many as two-thirds of IT workers are open to or are already actively seeking new job opportunities, a global analysis of 18,000 employees indicates, putting CIOs in a precarious position as tech talent shortages bite. 

A workforce survey conducted by analyst […]

2022-03-13T22:57:44-04:00March 13th, 2022|

Tech watch: New style “shotgun” mic

Microphones come in all shapes and sizes. Some may be very small and used in covert applications. Others may just take on unique designs. This mic clearly adds the humorous effect, but it does go to show that microphones can be designed in any shape or size.

2021-09-30T09:23:48-04:00September 30th, 2021|

When the insider becomes an outsider- Terminated employee destroys company data.

Insider threats are one of the most significant security concerns for all businesses. Many companies do not recognize the dangers that may exist within their own staff. This can quickly become apparent when an employee with a grudge is terminated.  This employee was with the company for just 6 months, but was able to cause over $100,000 in damage within two days of her termination.

2021-08-23T08:14:54-04:00August 23rd, 2021|

Threat watch: “Glowworm” attack using power LEDs

Researchers at Ben Gurion University have demonstrated a new class of TEMPEST attack for intercepting confidential information. Their technique involves recovering sound by analyzing optical emanations from a device’s power indicator LED, specifically in the circuits providing power to various speaker systems. Could your conversations be vulnerable?

2021-08-12T14:44:14-04:00August 12th, 2021|
Go to Top