14

Nov 2019

What is TSCM?

What Does TSCM Mean

TSCM, or technical surveillance countermeasures, is a Government-endorsed term that refers to a sweep for devices used to eavesdrop on corporations and track individuals without them knowing. When it comes to answering the question, what is tscm, many factors go into defining it.

Browse Our TSCM Solutions

 

Benefits of Counter Surveillance Services

The main purpose of this type of surveillance is to protect those who are in danger of being harmed. This applies to both families and employees of a business. In the case of employees, they may be targeted because the business they work for gives them access to proprietary information that must be kept under wraps. They may also be targeted to give up trade secrets and/or financial records.

Any business will likely see a boost in both profits and productivity when counter-surveillance is used. It frees management up to focus on other important tasks. In addition, it has been proven to cut down on workplace violence as well as sexual harassment.

 

Counter Surveillance Techniques

Technical surveillance devices are detected by sweeping. This means that devices are located through the radio waves they emit. The majority of devices that are able to monitor or record give off radiation that can be detected by the surveillance equipment.

Advances in technology have made it possible to detect devices that do not emit any radiation. There are three categories of countersurveillance measures. They are communications, physical and IT. Some tools that all of them have in common are flashlights, ladders, multimeters, sledgehammers, screwdrivers, etc.

Of the three categories, IT is the broadest. It includes network security and computer software programs meant to prevent espionage, something IT infrastructures are very vulnerable to.

There are several steps involved in IP security techniques. They involve installing:

  • Firewalls for software and hardware
  • Virus scanner installation
  • Damage control measures
  • Sweeping for the presence of eavesdroppers

One common technique is a bug sweep. For anyone asking themselves how do bug sweeps work, the answer is that it is a very technical process. Tests that are performed as part of the process include an analysis of both telephone lines and radio spectrums.

Another countersurveillance technique that is often used is the tapping of phone lines. It can be used with fax machines as well. Different types of equipment are used for different techniques.

 

TSCM Equipment

There are many types of equipment that are used in the testing process. They are used to identify as many radio signals as possible. As the signals are found, the equipment wipes them out and renders them useless.

Any TSCM professional will use certain pieces of equipment. Among the most important is a spectrum analyzer. This is used to find and map radio frequencies. Other equipment used includes a Non-Linear Junction Detector, which identifies circuits found in microphones and other similar devices. Thermo imaging cameras are also used. Their purpose is to detect devices hidden behind walls.

TSCM equipment is also used to inspect computers. It is a necessary part of running any type of business. Periodically, every business needs to perform some security housekeeping. In extreme cases, an internal investigation should be performed also.

The reason for this is that a business may inadvertently overlook signs that their computer equipment has been compromised. A sweep using TSCM equipment ensures that nothing is missed.

The equipment used by TSCM professionals has detection capabilities, as well as portability and specific features needed for countersurveillance. Each piece is designed to fulfill a certain need when it comes to bug sweeping.

When someone asks themselves “what does counter surveillance mean?” the answer is detailed. Understanding the process is the first step in getting the most out of it.

 

Finding A TSCM Professional

To hire a TSCM professional, contact Silent Guardian Security. The services provided are thorough and performed by experts in countersurveillance techniques and performing sweeps.

Request a Quote