Questions?, we have ANSWERS
Below are the answers to the most asked questions. Should you have a question that is not addressed below, send us an email. Our customer support department is always ready to assist. We do not address pricing on the website as every project is different and varies from client to client. We welcome the opportunity to provide a quote based upon the scope of the project.
What does Technical Surveillance Countermeasures (TSCM) mean?
A Technical Surveillance Countermeasure (TSCM) sweep is also commonly referred to as an Electronic Bug Sweep or an Electronic Surveillance Sweep. A TSCM survey is a service provided by trained and qualified personnel to detect the presence of technical surveillance devices (eavesdropping or spying devices) and other information security hazards and to identify technical and communications security weaknesses that could aid in the technical penetration of the surveyed facility.
What is the definition of Technical Counter Surveillance?
Technical counter surveillance refers to measures taken to prevent or disrupt surveillance, including measures to prevent electronic eavesdropping. Counter surveillance may include electronic methods such as TSCM “bug” sweeping, the process of detecting surveillance devices, including covert listening devices and visual surveillance devices (video). More often than not, counter surveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of effective surveillance.
Who is a target of eavesdropping or spying?
Companies, law firms, non-profit entities and charities, governments, private individuals, no one is immune from spying. The bottom line is, if you discuss valuable information that would be of benefit to anyone, be they a business competitor, opponent in a lawsuit or some other adversary, then you are a potential target of electronic eavesdropping.
What are some indicators or “warning signs” that you are the subject of spying?
- You recently lost a Bid or Request Proposal that you would normally win
- You have an unexplained decrease in new sales
- Your company’s business strategies are revealed
- Your pricing and sales strategy is known by your competitors
- Contract negotiations for labor and contracts are more increasing more difficult
- Company trade secrets are exposed
If any of the above has occurred, you should consider revisiting your risk management protocols and consider scheduling a Technical Surveillance Countermeasure sweep.
What are some high threat business situations?
Anyone can be the target of covert eavesdropping and spying however; some companies or organizations are at higher risk than others because of their occupation, financial position or legal situation. A company is most in danger of an electronic eavesdropping attack when:
- Business expansion or reorganization plans are being discussed
- Key executive(s) leave or are leaving
- New products, pricing or marketing plans are being developed
- Acquisitions or mergers are being planned.
- It is in a sensitive or high profile industry
- Executives or clients are subject to media attention.
- There are ongoing labor negotiations, labor problems or union activities
- It is involved in any type of litigation, lawsuit, or other civil action
- It is considering laying off or terminating employees or already in the process of doing so
Where are you likely to be targeted?
The company boardroom, telephone system, mobile phones, fax machines, computers are examples of sources of confidential information that may be targets for the eavesdropper. Also, eavesdropping need not be confined to the company office. Executives and other key personnel can be targets at home or in their automobiles.
What are typical environments where a listening device would be hidden?
- Business Offices, including conference rooms, boardrooms and executive offices
- Private Residences and Home Offices
- Executive Residences
- Corporate Apartments
- Vehicles (Cars, Aircraft, Boats)
- Home Phones (landlines)
- Quarterly Board meetings
- Off-site business meetings
Any area in which important information that would be valuable non-public information to a third party, would be openly discussed with other persons present or via a telecommunication device present in that area, which has not previously been rendered secure.
What types of devices will you screen for during the sweep?
There are many types of electronic eavesdropping devices or bugs. During a TSCM sweep, we will typically search for the following devices:
- Wireless video devices
- Laser and infrared eavesdropping devices
- RF, UHF and VHF wireless transmitters
- Wire and microphone taps
- Audio devices of all kinds
- Telephone bugs
- Carrier current devices
- GSM Bugs
Where can bugs be hidden?
Electronic eavesdropping devices can be hidden in any room, device, furnishing or container that would typically be found in an office or home setting. Today’s eavesdropping devices are smaller, more sophisticated, less expensive and easier to hide. Video as well as audio can be captured, recorded or even transmitted live. The good news is that all of these devices are detectable with the right people, equipment and methodology.
What happens during a typical TSCM examination?
Our TSCM professionals will conduct a detailed examination of your location in order to:
- Discretely determine the threat to the location
- Detect the presence of technical surveillance devices and hazards
- Identify technical security weaknesses that may allow illegal penetration of your facility
- Provide a professional evaluation of your facility’s technical security position
- During the actual sweep, our team will visit the location of concern and perform a comprehensive visual, physical, and electronic inspection to determine the presence and location of any and all electronic eavesdropping devices. We will also identify other technical weaknesses that may exist in your security posture.
During visual inspections, we look for hidden eavesdropping devices in areas in which they are commonly found.
During physical inspections, we take it a step further, physically and thoroughly examining furniture, outlet covers, ceilings, and other locations commonly housing hidden eavesdropping devices such as microphones, recording devices, transmitters, camera systems, and more. During the electronic inspection we use a variety of sophisticated electronic equipment to identify and locate hostile signals and other signs from eavesdropping equipment that may be secreted in the area. Additionally, we survey AC electrical outlets, telephone cables, computer lines, and other wiring capable of transmitting communication, looking for wiretapping and other intercept devices.
After all TSCM sweeps, we will provide you with a detailed written report of the results of our examination and any recommendations on improving your technical security posture. Should any follow-up measures be needed (e.g. the removal of a recording device), we will work with you to identify the origin of the device and help put measures in place to reduce future risk of attack.
How long does it take for a TSCM sweep to be conducted?
TSCM Sweeps can take anywhere from a few hours, to a few days and in some cases as long as a couple of weeks. It depends on the size of the area or building to be swept, and the amount of electronic and communications present within the concerned area.
What does a Legitimate Bug Sweep Cost?
Electronic eavesdropping detection is a highly specialized and professional field. It requires an array of sophisticated and expensive hardware equipment and specialized software. Additionally, it requires years of practical experience and ongoing training to master the craft and to remain current in the field. It is not a service that can be effectively provided at a discount. The fees for our services are fair and consistent with the skill of our technicians and the value of the comprehensive TSCM sweep that we provide. It is also consistent with the industry pricing for a sweep conducted by a legitimate professional TSCM provider.
Recurring scheduled inspections tend to be more cost effective and offer the best value, as we will establish a baseline friendly RF signal list during the initial TSCM sweep and build on this history during each recurring TSCM sweep. This signal history can then be used during each recurring sweep and will save the technician’s time and therefore the client money. It will also allow for a more effective TSCM sweep.
What is your coverage area?
TSCM America® provides Technical Surveillance Countermeasure sweeps across the United States.