About TSCM 2017-03-15T12:08:17+00:00

TSCM Tools and Techniques

Technical Surveillance Countermeasures, or TSCM, refers to methods of protection against technical or electronic surveillance. A number of countermeasures tools and techniques are used in our sweeps.

At Exec Security we regularly research new threats and new technology to insure that we have the ability to protect against all eavesdropping and technical surveillance threats.

Call us now if you suspect any problems with privacy, corporate espionage, or surveillance devices. We are always happy to discuss your concerns and make recommendations at no cost.

Radio Frequency Analysis

Many eavesdropping devices use radio signals to send audio or video out of the target area. One of our main TSCM tools is the RF spectrum analyzer. This instrument provides a visual display of all radio signals found in the vicinity. Through this device we can see not only the strength of the signal but also the exact frequency, steps can then be taken to locate the source of the signal.

Other specialized receivers are used in TSCM that are dedicated for certain tasks. These include detecting cellular and GSM transmitting devices, checking for “near field” signals to narrow down and pinpoint the location of a transmitter, and checking power lines and other wiring for low frequency or “carrier current” signals.

REI Oscor Spectrum Analyzer
REI CPM 700

Electronic Device Detection

The Non-Linear Junction Detector, or NLJD, is a highly specialized tool that can detect electronic devices, even if they are not turned on or active. NLJD can find electronic components that may be disguised or hidden in other objects such as books, furniture, or woodwork. Sometimes referred to as a “broom”, the NLJD is one of the most important TSCM tools.

NLJD
NLJD checking a potted plant

Thermal Imaging

Electronic devices will generate heat when they are powered on. We use Thermal Imaging in a TSCM sweep to determine if there are any signs of heat in places where it should not belong. Thermal readings from cameras and eavesdropping devices may show up in ceilings, behind walls, or in many other locations. Any such readings will be investigated to determine if the source may be a surveillance device.

Thermal Imaging a Heating Vent
Heating Vent

Thermal image reveals electronics hidden inside an air vent.

Telephones & Wiring

Telephone devices and wiring have always been a target for eavesdroppers and corporate spies and are an important aspect of TSCM sweeps.  We inspect telecom equipment and associated wiring for any abnormalities that could indicate tampering or other eavesdropping vulnerability.

Telephone lines that connect to the outside can also be inspected. They might be from the local phone company, cable company, or digital lines, each mode has its own strengths and weaknesses that should be evaluated.

We have experience and training with many varieties of PBX telephone systems which also may have unique vulnerabilities. We can look at your system and identify threats and vulnerabilities that may exist there.

Voicemail hacking is another area plaguing many businesses today that should be considered in TSCM. We have helped solve a number of hacking incidents where PBX’s and voicemail systems had been compromised causing unauthorized toll charges, theft of information, and corporate harassment.

For problems ranging from simple wiretaps to sophisticated hacking, we can be trusted with inspection of your telecom system.

Read more about wiretap threats and detection on our wiretap page.

Wiring closet
66 blocks double punch

Wiretap found on a punch block in a corporate telecom room during TSCM inspection.

Wiring Mess
Wiring Mess

Does your wiring look more like this? We have the tools and experience needed to trace these lines.

Networks, Wifi, & Cyber Security

An important security concern is your computer network. There are many areas that firewalls and other typical cyber security measures cannot protect. Many vulnerabilities exist in areas where the data network connects with wiring and hardware devices. TSCM sweeps are necessary to secure the gap that exists between cyber security and physical security.

Network ports, wiring, and data jacks can be easily compromised. We test cables and jacks to insure proper interconnections. Small microphones have been found embedded inside data cable plugs.

Unsecured wifi and rogue access points can allow a cyber intruder to gain access to the corporate network. Many stand alone eavesdropping devices are also able to use wifi to send their audio or video out of the target area beyond the range of typical radio transmitters. We inspect all wifi signals in the area to detect such vulnerabilities.

Aircheck Screens

Physical Inspection

One of the most important parts of a TSCM sweep is the physical inspection. We inspect all areas in and around the target location. This will involve inspecting furniture, ceilings and soffits, electric outlets, cabinets, and any location that could conceal surveillance devices.

Along with standard tools and flashlights, we also use micro video cameras that help to view inside small holes, crevices, and compartments that may be difficult to inspect visually. Many devices and vulnerabilities are found during the physical phase of the TSCM sweep.

Video inspection of a vent
Physical Inspection