Our Services 2017-03-20T16:36:04+00:00

TSCM Inspection Services

Technical Surveillance Countermeasures, or TSCM, refers to methods of protecting information and communications against electronic eavesdropping or other forms of technical surveillance. We offer professional bug sweeps and other technical security measures to help protect your privacy and confidential information.

Corporate Bug Sweeps, Eavesdropping Detection

Uncovering eavesdropping devices is a highly technical job that requires professionally trained and equipped personnel. It involves understanding the scope of the threat as well as performing numerous electronic tests and a thorough physical search of the target area.

Our electronic inspections are very thorough. They include radio spectrum analysis, telephone line inspection, thermal imaging, and multiple procedures using other specialized equipment.

Cyber Security TSCM, Wifi and Network Inspection

TSCM is an important aspect of cyber security that is often overlooked. Many devices now communicate over the internet. While much of cyber security is focused on network firewalls and software threats there are many other vulnerabilities that exist in the physical layer of your network (hardware connections). These are often not recognized by typical network security measures. We address these issues in our sweeps.

Wifi and BYOD (Bring Your Own Device) present a big threat to corporate networks. Rogue access points and unsecured connections can open your network to outside invasion and manipulation.

Many devices communicate over the internet or through cellular signals, Industrial Control Systems (ICS) as well as Internet of Things (IoT) devices are all capable of being exploited for surveillance purposes.

TSCM Residential Bug Sweep

Many executives will have confidential meetings and phone calls at their homes. The home is often less secure than their office and becomes a more enticing target for the eavesdropper.

Celebrities and other high profile individuals may be the victim of overzealous fans or news investigators trying to discover their private activities.

Physical threats to executives or others are usually preceded by surveillance. Attackers would want to know schedules and other activities going on around the home.

Covert Video Discovery, Hidden Camera Threat

Video cameras and recorders come in many disguises and small sizes, some have microphones connected as well. There is the threat that confidential information could be intercepted including executive activities, but there is also concern that a breach of privacy would not only be damaging to an individual but could also result in huge law suits directed at the facility or corporation.

Image of a hidden camera in a smoke detector

Telecom Inspection, Digital and Analog Phone Systems, PBX’s, VOIP

PBX and other telephone systems have a number of inherent vulnerabilities. Examples include call monitoring, software taps, voicemail interception, and many varieties of hacking. We have helped resolve many incidents where phone systems have been compromised.

Vehicles and Aircraft

Many meetings occur on the road, in the air, or at sea, where confidential information could be discussed at length. Cars, limousines, and private aircraft are prime targets for espionage. Personal security is also at risk if adversaries are tracking vehicle movement for the purposes of planning an attack. We inspect vehicles for both eavesdropping devices and gps tracking. Devices found on aircraft and yachts include WiFi transmitters, audio recorders, and covert video cameras.

Active Monitoring, Real Time Spectrum Monitoring for Meetings

During important corporate meetings or conferences there is concern that confidential information being discussed might be transmitted directly from the meeting via devices brought in with a participant. During such meetings, radio frequency analysis can be performed in a nearby room or office to determine if a signal of any kind is coming from the meeting room. A full sweep of the room, telephones, audio / visual equipment, etc. prior to the meeting would also be appropriate in these instances. We also recommend establishing clear policies regarding the use of laptops and cellular phones at such meetings.