Technical Surveillance Countermeasures Live Monitoring: Who Needs It and Why?

Articles
Published:
March 30, 2021

Technical Surveillance Countermeasures (TSCM) is one of those highly sophisticated tools within the security practitioner’s toolbox. For most, it is that “odd-sized” tool that you would find toward the bottom of the box, just below the tools you use all the time. However, the times have changed, and TSCM is moving to the upper layers of the toolbox.

Theft of intellectual property, information privacy, and stalking have given rise to TSCM and its many applications.TSCM was often thought of as a high-tech process used exclusively within the government at top secret locations. But today, with the threats previously mentioned, TSCM has been firmly planted within the corporate community. Sweeps are routinely conducted for C-Suite offices, traveling executives and their hotels and transportation, and even home offices, with the increase in remote work attributed to COVID-19.

The need for privacy goes beyond the walls of the office, and the cost of a conversation regarding new business ideas, inventions, or acquisitions being overheard far outweighs the cost of the sweeps.One specific TSCM task that is discussed but often misunderstood is the ability to do live monitoring. Let’s talk about where TSCM Live Monitoring fits in.The TSCM sweep is designed to ensure an area of concern, for example, the C-Suite and adjacent areas, is free of any devices which may capture, record, or transmit information to another party. Once the technicians have established the area is free of any devices, an active monitoring station is established.

The equipment used is typically set up in a designated area, such as a conference room within the C-Suite. Initial readings are taken to establish a baseline of signal activity within that room, and then the technicians monitor the signal traffic during the meeting.In conjunction with live monitoring, policies are normally established by the meeting host that restrict attendees from bringing phones and electronic devices into the meeting space. Any “burst” or signal that occurs during the meeting is immediately captured by the TSCM technician. If the burst is an anomaly consistent with an audio-capturing or video device, the meeting would be halted, and additional measures would be taken to identify the location or cause of the burst.So, when is this level of technical surveillance countermeasure (TSCM) necessary? Corporate board meetings top the list of requests for this level of service, followed by meetings in which new product rollouts and inventions are discussed. However, TSCM and TSCM live monitoring apply to a variety of situations, ultimately determined by the client.

Subscribe for Cutting-Edge Security Insights!

Get the latest news, expert insights, and exclusive updates right in your inbox.

By clicking Sign Up you're confirming that you agree with our Terms and Conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

How Life Events Change Your Safety and Security Needs

Anytime is a good time to evaluate your family’s privacy, security and resiliency. As the landscape of your family’s lives change, so do your security needs. Evaluate, Plan, and Partner with the right professionals to ensure all your security needs are met.
May 27, 2021
Cyber Security

Red5 Security Expands Advisory Board & Internal Expertise to Broaden Digital Solutions

Cybersecurity Veteran & Threat Intel Executive Bring New Perspective to R5’s Core Offerings
January 19, 2023
internal threat analysis
Threat Monitoring

Best Practices for Internal Threat Teams During a Crisis

The recent violence in Israel is a stark reminder of how quickly the security environment can change—often without warning—and raises the risk for a company’s safety of personnel, facilities, and operations. The war in Ukraine continues and other threats loom, which can overwhelm your threat monitoring teams or operations center.
October 10, 2023

Let's discuss your security.

Partner with Red5 for unmatched intelligence and analysis expertise tailored to your needs.