TSCM (Technical Surveillance Countermeasures)
What is Technical Surveillance?
Technical Surveillance, otherwise known as ‘spying’, ‘bugging’, ‘monitoring’, ‘corporate espionage’ etc… is the use of technical equipment to infiltrate information & intelligence on an individual, company, corporation and/or government. These can be in the form of illicit software and hacking, through to physical video and audio devices hidden in virtually any everyday objects. Due to the modern day advancements in technology, these methods have become ever more available and affordable to an average everyday person with minimal knowledge needed on the subject.
Basic covert listening and video recording devices range from £50 – £500.
Who is capable of technical surveillance? Put simply; anyone…!
Espionage is often thought by individuals to only be the provisions of government intelligence services and film characters, such as James Bond, Jason Bourne or Ethan Hunt… In this modern technological world this is far from the truth and covert-monitoring devices can be legally bought over the counter or internet.
Due to the availability and affordability of technical surveillance devices, this security threat has increased over the past few years inline with Cyber Security threats. Often these devices work alongside or embedded into WiFi, computer and/or phone networks
What do we do if we suspect a technical surveillance/espionage attack? Be cautious…
There are dozens of companies who profess to be ‘experts’ in TSCM operations. The fact of the matter, there are far less companies who can deliver a professional service than who say they can. A full compliment of market leading TSCM equipment costs upwards of £200,000 with multiple physical, technical and electronic devices. Be aware of the dozens of ‘amateurs’ professing to offer these services at budget prices.
We advise you ask and check that any provider delivering these services for you, hold an adequate equipment portfolio prior to any work, contract or agreement being signed.
The only way to be sure is to contact a professional TSCM provider such as ourselves. If you do suspect an attack we recommend:
- Contacting us via payphone or a phone unassociated with you or your business.
- Alternatively send an online enquiry – do so via a computer not linked to you or your business.