A Technical Surveillance Counter Measure assessment (TSCM), often known as a “bug” sweep or an electronic surveillance sweep is a highly specialized service that detects eavesdropping devices such as hidden microphones and cameras or “bugs.” A Technical Surveillance Counter Measure is designed to identify recent security breaches and potential weaknesses in technical and communications security and recommend remedial measures to reduce the risks.
Government agencies, Fortune 500 corporations, and private business entities hire experienced professionals to perform technical surveillance countermeasures for corporate offices, conference rooms, boardrooms, off-site meeting locations, hotel rooms, conference centers, executive home offices, and vehicles of all kinds. Some locations that are often over looked are aircrafts (planes and helicopters) and watercrafts (boats and yachts). Where ever pertinent conversations takes place should be swept to ensure threats do not exist.
Understanding the most recent risks and utilizing cutting-edge technology to combat and mitigate those attacks sets us apart from the competition. Using sophisticated technology, we can identify the presence of such devices. The following types of illicit devices are sought after:
- Hidden Cameras: Advances in technology have resulted in smaller, higher-quality cameras, which can be troublesome if they fall into the wrong hands. Because the technology has been shrunk to fit on the head of a screw, locating these cameras without specialized instruments can be difficult.
- Hidden Microphones: Microphones, like cameras, have only become more discreet and efficient over time.
- Plop & Drop: A plop and drop device includes any cloned device that can be installed without the use of cabling. A cloned device refers to a device that may have a dual function. For example a clock, radio, USB charger, key fob, wrist watch, smoke detector, etc. These devices may transmit data over the local internet, cellular, bluetooth, IR or RF signals. Plop and drop devices can also record locally, recording data on an SD card and retrieved at a later time. They are a great threat due to their concealment abilities.
- Even though wiretapping is a way of the past there is still audio leaching devices in use today as a way to circumvent monitoring technology. This technique lets the intruder utilize the existing cabling infrastructure to listen and intercept conversations without being compromised.
One can make use of technical surveillance countermeasures (bug sweeps) in a variety of ways, including:
- To survey for illicit audio and video devices in areas of interest prior to having important guests, business deals and board meetings.
- To survey a space after a particular (non trusted) guest has been in your space.
- Going through a personal or business divorce where you feel the opposing party knows too much information.
- If you fired a long time employee or a technical employee you feel had access to important areas of the facility.
- Corporate business often conducts TSCM sweeps multiple times per year in order to be pro-active to electronic types of threats.
If proper attention is not performed, sensitive data is at risk of being jeopardized. As the digital era has advanced, so have security concerns. Not only may your company’s sensitive data be compromised, but so could the privacy of your employees. You not only have a moral duty to protect your employees’ personal information as well as your own, but you also have a legal commitment.
Risk assessments are essential for maintaining your organization’s continuity, security, and peace of mind. Identifying the likelihood of electronic eavesdropping should be an important part of your organization’s overall risk management strategy. Bug sweeps and other technical surveillance countermeasures will boost employee confidence and keep work environments safe.
There is a fine line between TSCM and cyber services that may involve cell phone comprises. Many of these services go hand and hand with one another. A common security lapse is with the use of cell phones.
Cell Phone Recording Apps: As smartphones have become more common, they are prone to eavesdropping and espionage breaches. Because of their simplicity of implementation and usage, certain types of bugs have risen in popularity. Monitoring software and programs may record conversations, view internet history, and even collect ambient noises in a space while staying undetected.