technical surveillance countermeasure services

Technical Surveillance Counter Measures

Presidia Security

Introduction

In today’s business landscape consideration of threat levels and protecting your intellectual property against outside entities is a growing concern for every organization. What is the cost of not utilizing a Technical Surveillance Counter Measures (TSCM) program in your daily business? Is the cost associated with the implementation of an effective TSCM program worth a loss on the bottom line of your business? Have you considered the negative impact on the reputation of your organization and the embarrassment to your Executives and Leaders?

Technical Surveillance Counter Measures Discussion

When considering implementing a TSCM program an organization must identify exactly what type of information is to be protected from external threat elements. This may be intellectual property, critical business information, ideas, business processes, materials or its employees as a whole. As a business, you need to know and understand where the threat is coming from. It could be business competition, foreign governments or an insider threat attempting to do harm to the organization for personal or financial gain. Although the technology and techniques used in the deployment of surreptitious recording devices are ever evolving, Presidia has identified the foremost technical processes in today’s environment to protect your organization from the following attacks:

  • Acoustic and microphone hardwired electrical, telephone and computer feeds, photocopier lines, VoIP or Wi-Fi devices used to capture private communication during a telephone conversation or board meeting scenarios are commonly known as “wiretapping”;
  • Radio frequency (RF) and microwave transmitters with both analog and digital capabilities capturing both audio and video signals; Laser technology, a threat being utilized from a distance to gain information from your organization and business prospects;
  • Hidden audio and video devices hand carried into your business by your staff or guests who have been invited into your organization. This method may come in the form of gifts, cleaning materials or daily administrative tools, such as staplers or general items utilized within the office environment;
  • Overt recording devices with audio capturing capabilities on smart phones and computer devices brought directly into meeting rooms;
    and
  • Finally, and often overlooked are corporate automobiles. A great deal of information can be gathered from within company vehicles in which
    executives travel in daily. Often this method is easier than infiltrating
    boardrooms and offices due to the lack of security placed on corporate automobiles when they are parked.

These threats have been observed by the Presidia team in both the corporate business environment and within government organizations. These types of technical strikes have caused a great deal of damage to both business reputations and profitability. How does senior management mitigate and institute preventative measures to eliminate such intrusion by outside entities? Some areas for consideration are:

  • Adopting a robust TSCM program, which uses state of the art technical equipment and well trained TSCM Technicians with expertise, training and abilities to ensure your exposure to such technical threats are
    removed and mitigated;
  • Using experienced TSCM professionals to identify, isolate and nullify vulnerabilities and weaknesses. TSCM professionals can also ensure
    that security needs are identified to assist the organization in preventing technical attacks;
  • Conducting evaluations to identify best practices and recommend security measures to eliminate threats and vulnerabilities. Recommendations may include training of security staff or enforcing high-security zones, which may eliminate the potential introduction of electronic devices into high-level meetings;
  • Educating employees so they understand that security is everyone’s responsibility; and
  • Maintaining a cost-effective TSCM program that identifies regular technical sweep activities, pre-sweep activities and post sweep activities to prevent the loss of intellectual property and to ensure privacy for clients during sensitive negotiations.

CONCLUSION

In conclusion, a Technical Surveillance Counter Measures sweep should be considered as one-part of an ongoing and evolving security program. Building a defence to possible threats will assist with mitigating the risk to an organization. As the capability to intercept communications becomes more advanced and inexpensive to manufacture there will be a never-ending opportunity to access and steal information and intellectual property. Selecting a reputable TSCM provider who utilizes and deploys the latest technology in conjunction with well-trained technicians will assist in protecting your company and its information.