Vulnerability on VOIP phone systems.

by Charles Patterson
Patterson Communications, Inc.
www.execsecurity.com 

VOIP vulnerability and disaster recovery

 We’ve had a busy schedule here in the New York area since Hurricane Sandy hit. A few of our clients lost their entire offices due to flooding from the Hudson River and had to relocate. We have been spending many hours helping some of them […]

By |2016-12-16T20:24:04-05:00December 11th, 2012|

International voicemail hackers attack random US phone systems

Along with eavesdropping and theft of information, your voicemail system is also vulnerable for financial exploitation. In the past decade, there have been numerous occurances of voicemail systems being hacked for financial gain.  In many of these incidents the technique used was trying to force voicemail systems to place international calls to the Philippines, Cuba, or […]

By |2016-12-16T20:24:05-05:00August 17th, 2012|

TSCM Electronic Security Sweeps for Law Firms and Their Clients

Sharon Nelson and John Simek, of Sensei Enterprises, host a monthly podcast called Digital Detectives on the Legal Talk Network. Their guest for March 2017 was Charles Patterson of Exec Security TSCM. They discussed electronic surveillance countermeasures and how electronic security sweeps can help ensure privacy for lawyers and their clients.

By |2017-04-07T10:09:41-04:00March 31st, 2017|

About TSCM

TSCM Tools and Techniques

Technical Surveillance Countermeasures, or TSCM, refers to methods of protection against technical or electronic surveillance. A number of countermeasures tools and techniques are used in our sweeps.

At Exec Security we regularly research new threats and new technology to insure that we have the ability to protect against all […]

By |2021-01-29T12:21:43-05:00April 7th, 2016|

Our Services

TSCM Inspection Services

Corporate TSCM Sweeps, Eavesdropping Detection and Electronic Countermeasures

Uncovering eavesdropping devices is a highly technical job that requires professionally trained and equipped personnel. It involves understanding the scope of the threat as well as performing numerous electronic tests and […]

By |2021-08-02T09:11:46-04:00April 2nd, 2016|
Go to Top