Corporate Technical Surveillance Counter Measures (TSCM) is the process of detecting and countering the unauthorized use of electronic surveillance devices, such as listening bugs, cameras and tracking devices. TSCM services are provided by private companies who have expertise in the area of electronic countermeasures and can provide a comprehensive security assessment of your premises and identify any potential vulnerabilities to electronic surveillance.

The TSCM process typically involves the following steps:

  • A physical inspection of the premises to look for hidden devices.
  • Electronic sweeps using specialized equipment such as a Radio Frequency Detector or Camera detector.
  • An electronic communications audit that includes phone lines, WiFi and server rooms.
  • The provision of countermeasures against any detected devices and recommendations on evidence handling.
  • The provision of training for staff on how to recognize and deal with threats from electronic surveillance.

Benefits of a Corporate Technical Surveillance Counter Measures (TSCM) Strategy

A Corporate Technical Surveillance Counter Measures (TSCM) Strategy can offer a number of benefits to an organization, including:

  1. Prevention of information breaches – the potential loss and reputational damage that an information breach might incur can far outweigh the cost of implementing a proactive TSCM strategy. Prevention is better than cure.
  2. Demonstrates best practice approach – having a proactive TSCM program in place demonstrates a best practice approach which will be appreciated by corporate clients and can help to win new business.
  3. Offers an additional level of comfort to existing clients – being seen to have considered every eventuality gives clients confidence that their data is safe and secure with you.
  4. Helps protect your Intellectual Property (IP) – corporate espionage is on the rise and without adequate security measures in place, your IP could be at risk. TSCM helps to protect your confidential data and prevent it from falling into the wrong hands.
  5. Enhances your reputation as a responsible and security-conscious organization – consumers are increasingly aware of the importance of data security and are more likely to do business with organisations that take data protection seriously. Having a TSCM strategy in place sends out a strong message that your organization takes data security seriously and is committed to protecting its customers’ information.
  6. Helps ensure compliance with industry regulations – adhering to industry regulations is not only good for business, but it is also essential for protecting your reputation and avoiding costly fines. TSCM helps you to meet your compliance obligations and protect your business from regulatory penalties.

We Use the Best TSCM Equipment

We use the best bug sweep equipment available. Key features of effective bug-sweeping tools include the ability to:

  • Detect RF energy emissions.
  • Identify unknown Bluetooth, Wi-Fi, and cellular signals.
  • Detect hidden microphones.
  • Find hidden electronics even when turned off.
  • Evaluate thermal energy from hidden devices.

What you can expect during the sweep:

  • RF Spectrum Analysis of the zone and surrounding area followed by near-field RF detection.
  • 2G, 3G 4G, and 5G Sweep for devices that use cell phone technology
  • Wi-Fi and Bluetooth device surveys
  • Wire tap checks of phones, lines, cables, wall jacks, server rooms and telephone rooms
  • Acoustically stimulated microphone detection
  • A physical search of the designated zone with a bore scope
  • Non-Linear Junction detection for devices in standby mode or powered off.
  • Thermal imaging check for hidden heat signatures
  • Threat Assessment

What Our Clients Say

My company was being spied on by competitors. I knew what they were looking for from outside sources but I did not know how they were going about it. I hired COMSCAN to find out how and where the leaks were originating. Hiring them was a wise decision. Stephen was thorough and knowledgeable.  After discovering a major problem area he continued on in a tenacious manner and found another source of the information leaks. He also provided me with some useful recommendations after he finished.

Thank you so much for taking on our assignment on such short notice. We greatly appreciate your professionalism and the manner in which you handled our requests while you worked!

How Can We Help?

Name(Required)
I am interested in:(Required)
MM slash DD slash YYYY