Determine the level of information security within your company and neutralise threats to your communications security
Considering the revolution in both size and power sources for clandestine listening devices and recorders since the Watergate scandal, it is suggested that the incidence of illicit technical surveillance has grown exponentially during the same period.
Such an assertion is not based on hype or paranoia. Several stories about the bugging of offices and the tapping of telephones have surfaced in the media over the past few decades. However, such stories are only examples of security breaches that have been reported in the public domain. These stories do not reflect the size of the problem, as few victims of technical surveillance are willing to publicise their experiences.
An industry survey identifying trends in proprietary information loss from businesses, sponsored by ASIS International and PricewaterhouseCoopers, reported that: “In today’s highly competitive global marketplace, it is essential for managers to recognise that the intellectual assets of business are highly sought-after commodities”.
Therefore, whilst we cannot realistically determine the size and scope of the threat of unauthorised technical surveillance, it is reasonable to assume that sensitive proprietary information (SPI) is a target for theft by unscrupulous third parties. Likewise, your communications can be compromised by the technical surveillance practices of hostile intelligence agencies, evidence gathering law enforcement, competitors, criminals and disgruntled staff members.
In order to understand the need for technical surveillance countermeasures (TSCM), it is important to define the service and realise the nature of the threat for which a TSCM sweep is required.
There are a range of technical surveillance and clandestine listening devices available on the internet and from specialised retail outlets. Some of these eavesdropping devices are powered by the mains, batteries or other sources. Also, such devices can use radio waves and GSM telephony signals to transmit audio to a recording device placed in proximity or some distance away. In order to detect, locate and identify, eavesdropping devices in your office, home or vehicle, a TSCM sweep is necessary.
Our staff have the experience and equipment to conduct a TSCM sweep at your premises, anywhere in Africa. Using our state-of-the-art equipment, we will uncover potential security breaches and identify previously unknown security weaknesses through a range of body worn, portable or static detectors. Also, we examine your telecommunications systems for potential compromise and carry out a physical search.
As a result, you will receive a report with our Findings and Recommendations. This report will provide you with a blue print to enhance your communications security and defeat technical attacks against your business operations.
If you suspect that you are the target of hostile technical surveillance, contact us via a secure means and we will schedule a visit.