(+44) 01908 639712 info@shearwatertscm.com

Shearwater TSCM’s Technical Surveillance Counter Measures (TSCM) services are dedicated to providing government level counter-eavesdropping protection to several governments, organisations, and corporate clients in the commercial and public sectors, around the world.

What is TSCM?

Technical Surveillance Counter Measures (TSCM) – also known as electronic bug detection, eavesdropping detection, bug sweeping of surveillance countermeasures is the method of physically inspecting offices, buildings, network and telephone systems and cabling for the existence of (most commonly) eavesdropping and to identify potential weakness in organisations’ security systems that could lead to the installation of illegal devices.

TSCM is a service that is provided to detect the presence of technical surveillance devices and hazards as well as to identify technical security weaknesses that could help in the conduct of a technical penetration of the surveyed area. A TSCM survey provides a professional evaluation of the area’s technical security position and results in a thorough physical, visual and electronic survey.

So, TSCM, in a nutshell, is technically a range of solutions designed to detect both active and passive bugging and eavesdropping devices, as well as solutions for active and intelligent frequency jamming.

Universal Mobile Telecommunications Systems – UMTS eavesdropping equipment is becoming more compact and sophisticated, making detection more difficult without the correct TSCM equipment. Surveillance devices and attack methods that use the world’s cellular telephone system are by far the most significant and fastest-growing surveillance threat and even organisations that historically weren’t seen as likely targets, can’t be considered immune from attack in today’s modern world. In recent years more GSM and Cellular bugging devices have been discovered than any other type of attack.

As specialists in the field of both corporate and government counter-intelligence and technical surveillance countermeasures, Shearwater’s services are second to none. As they are an independent company, they can provide their clients with the best combinations of TSCM equipment available without any bias or pressure. There is a variety of military-grade TSCM equipment available for a variety of different uses, which is also dependent on which country requires it, the size and complexity of the inspection.

The TSCM equipment ranges from theft and eavesdropping devices, safeguarding to provide information and conversations from corporate espionage and hostile surveillance.

So, whether it’s a sweep of your office or vehicle, securing your boardroom with a 24/7 countermeasure sensor, or help with training your staff on how to protect your IP securely, Shearwater can provide an end-to-end counter-surveillance approach that will need both your budget and security needs. So, if you need TSCM equipment, often referred to as bug-sweeping, which is a systematic physical and technical inspection of an area to detect, and provide protection from illicit eavesdropping devices, you’ll require the latest in counter-surveillance technology.

The latest TSCM equipment can identify attacks from a wide range of threats, including covert cameras, listening devices, GSM devices, Wi-Fi, Bluetooth, telephone bugging, and laser attacks – the list is endless. TSCM equipment can also detect unauthorised interception of sensitive information, which frees you up to carry on as usual.

So, once we’re clear on what your concerns are – perhaps being a victim of eavesdropping in the boardroom – Shearwater can provide you with the appropriate TSCM equipment along with many years of their expertise and advice in this sensitive area.

TSCM services can include:

  • TSCM/bug sweeping
  • Cyber TSCM
  • TSCM training
  • In-place monitoring (IPMS) – 24/7 countermeasures – Wi-Fi, GSM, RF, Bluetooth, and Dect detection
  • TSCM equipment – a collection of devices designed to help operators uncover hidden eavesdropping devices by alerting their egress methods when searching.

Finding Typical Threats

When a client believes they have a threat to their workplace, they initially contact a TSCM supplier for a sweep. A thorough TSCM inspection helps your organisation by ensuring your premises are free of any bugs or espionage equipment, ensuring your trade secrets, intellectual property, client information, etc. are protected.

So, TSCM sweeps are known by many different names, which include bug sweeping, TSCM inspections, electronic counter-surveillance for starters. They are all one in the same thing: an electronic and physical check or investigation of a room, building, area, or vehicle.

If a company has security and risk against them, they should consider having a TSCM sweep.  It depends on how much the company involved perceives the level of threat against them. For example, the company may be involved in a hostile takeover or substantial litigation, which will inevitably up the ante. If a company finds it is in a position where it is losing information and data, then the company should carry out a full internal investigation, and then external counter-espionage experts.

However, it is essential to remember that 99% of bugging devices seen in the films and on television are not technically possible, so to engage the services of TSCM specialists is not something to take on lightly.

The Benefits of a TSCM Sweep

With the rise of technical and economic levels of espionage being on the rise over the last decade, particularly with the increase of readily available equipment such as electronic bugs, listening devices, hidden cameras, etc. which can all be bought online, the risks for big businesses is higher than ever.

TSCM sweeps are therefore becoming quite commonplace.

A basic sweep will only scan for transmissions from covert devices and electronic signatures. Still, as these kind of sweeps are basic, they can occasionally be unable to detect bugs which are masked by being hidden within other electronics. So, if you deem your company’s information extremely sensitive and valuable, the benefits of a full comprehensible TSCM bug sweep could prove invaluable.

A full sweep analyses the entire working environment, including the premises, your practices, your staff, your technology, and any external threats.

In any corporate environment, digital phone systems are commonplace. And especially with the use of Voice Over Internet Protocol (VoIP) phone systems, which have made it easier for businesses to communicate all around the globe with anyone. But this inevitably causes security issues – if an attacker gains access to your phone system, they can listen to every call, even make outbound calls themselves, and on-sell the use of the system, and also disable all of your requests.

Telephone systems have always been extremely vulnerable to technical attack, including analog, digital and VoIP systems. Most buildings, vehicles, airplanes, and yachts also have large amounts of live, passive, or redundant structured cabling, which is also highly vulnerable to eavesdropping attack and use.

Perhaps bug sweeping and live monitoring of radio communications for sensitive meetings for the period of the meeting is required for your organisation?

These special bug sweep services consist of a bug sweep followed by continual live monitoring of the radio spectrum to make sure that no localised eavesdropping occurs while the particularly sensitive meeting is taking place. Telecommunication interception has become a significant industry, and your business or organisation could be unwittingly victim to one of the many threats available in a variety of devices. Near Field Communication is a contactless communication technology that is based on a radio frequency and which uses a base frequency of 13.56 MHz is designed to exchange data between two devices through a simple light touch gesture.

Cellular communication TSCM services cover:

  • SIM card forensic analysis
  • Digital forensic services
  • Over the air attack detection
  • Detection of interception via SS7
  • Detection of baseband processor hostile takeover
  • Detection of denial of service via jamming

Perhaps lens detection is more your issue?

These work by a camera lens detector noticing the reflection of light off the lens of a recording camera. If a camera lens detector is being used, the lens of a camera will sparkle or illuminate on the viewing screen, indicating to the user that a camera may be present. A non-linear junction detector, also known as an NLJD, is a device that illuminates a small region of space with high-frequency RF energy. This device is capable of detecting almost any unshielded electronic device which contains semi-conductors.

So, if your organisation needs your physical premises assessed you could find a bespoke TSCM package is required to analyse, detect and locate all types of transmitting devices which could include electromagnetic radiating devices, video, or data signals, including free air transmissions and devices that utilise AC/DC power as a transmission source.

Bug sweeping can be on any scale – it depends on the individual client’s needs.

The physical premises could be anything from home, a hotel room, a conference centre, exhibition chalet, offices, data centres, industrial sites, nuclear sites, factories, laboratories, to Supervisory Control and Data Acquisition controlled sites. Vehicles can be cars, jets and aircraft, even superyachts.

The list to uncover any rogue elements that could exploit in order to steal from or damage you is endless!

With the ever-changing face of not only technology but the world of threats, TSCM products are continually being updated to keep up with the demand. It is now possible to buy your TSCM products, albeit in a more straightforward format than if you relied on a specialist company.

It is essential that you trust and work well with your TSCM specialist as the equipment is extremely sensitive and often requires engineers when using.