Case Study

Quarterly TSCM

a gloved hand holds a small audio 'bug' used to secretly listen into conversations. Image links to a case study on quarterly tscm.

Red Five provides quarterly Technical Surveillance Countermeasures (TSCM) sweeps for corporate and individual clients concerned about the integrity of their communications systems. Red Five’s technicians perform sweeps at sites ranging from single-room apartments to extensive office buildings.Red Five’s technicians perform inspections and employ detection methods in order to fully reveal any potential points of compromise. The procedures that Red Five utilizes are capable of identifying both active and passive surveillance devices that can record and transmit conversations.

  • Red Five technicians perform an analysis of technical spectrums, to include radio frequency, infrared, and carrier current, in order to detect a variety of devices that adversaries may use to compromise communications.
  • Red Five also performs physical searches for hidden devices that may not register in spectrum analysis due to being turned off at the time of the sweep.

Red Five provides a report after the sweep, which outlines any detected devices that may threaten communications in the inspected area, and also provides recommendations for measures that the client can undertake to mitigate the risk of compromise. These suggested preventative measures cover a range of practices, to include the use of telephone system, mobile devices, copy and fax machines, as well as company policies and executive communications.Red Five performs these sweeps on a quarterly basis in order to detect any potential new communication recording devices introduced into the space after the previous sweep. However, Red Five recommends that sweeps occur at irregular intervals in order to ensure that adversaries cannot anticipate the inspections.

More Case Studies

a modern board room with a large table overlooks a cityscape. Image links to a case study on cyber audit & technology review

Cyber Audit & Technology Review

An employee within the IT Department of a financial services firm was overheard discussing a very sensitive program, only known to the Executive Team, in the break room by the Executive Assistant of the CEO.
a well dressed man sits in a small lobby looking off to the right while holding his phone. Image links to a case study on winning legal strategy.

Winning Legal Strategy: Investigative Findings

Discover how Red5's in-depth investigation revealed critical insights about a Person of Interest involved in international litigation. Our work in California and Washington DC exposed clandestine relationships and unique circumstances, informing and guiding our client's legal strategy effectively.
Image of cracked glass looking into a modern office links to a case study about threat intel and analysis

Tech Giant: Threat Intel & Analysis

Learn how Red5 Managed Threat Intelligence Services detects and mitigates threats for a large technology company.

Let's discuss your security.

Partner with Red5 for unmatched intelligence and analysis expertise tailored to your needs.