Technical Surveillance Counter-Measures

From Wikipedia, the free encyclopedia

TSCM (Technical Surveillance Counter-Measures) is the original military abbreviation provided to the trade of bug-sweeping or electronic counter-surveillance. It is related to ELINT, SIGINT and ECM.

The United States Department of Defense defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility.

This definition is however lacking some of the technical scope involved. COMSEC (Communications Security), ITSEC (Information Technology Security) and physical security are also a major part of the work in the modern environment, the advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge. Even PlayStation Portables (PSPs) have wireless connectivity and optional storage capacity, therefore connection and forward on receive over 54Mbps wireless for hundreds of meters is achievable. This is only the tip of the iceberg.

Contents

[edit] Technology used

Technology used for a bug sweep includes but is not limited to:

[edit] Cautions

  • Due to the esoteric nature of the intelligence field, there are many spy shops offering both low-quality bugs and low-quality bug sweeps. Without at least rudimentary knowledge of the problematics it is easy to become victim of a scam.
  • Never order a sweep from a telephone or other comm channel that can be bugged. Some bugs can be switched off remotely, which makes them even more difficult to find.
  • There is a continuous spectrum of adversaries and technologies they use; from a repurposed baby monitor that can be found with a $100 scanner to the most sophisticated toys of National Security Agency operating on almost-terahertz frequencies. Every measure has a countermeasure, which usually requires an adequately expensive equipment.
  • In some cases a security threat is only in the mind of the victim.
  • In some countries it is illegal to tamper with bugs planted by law enforcement agencies.
  • Some threats, eg. optical microphones or cavity bugs, are very difficult to find by electronics means.
  • Some equipment that is not a threat on itself may exhibit microphonics.

[edit] See also

[edit] External links