TSCM

Bug Detection Out of the Office

During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how. The common denominator was that the financial planner had entertained every one of the lost clients on his boat. Of course they had talked some business and the financial planner believed there must have been a listening device or some sort of spy equipment on the craft. When a TSCM sweep is requested, it is most often for an office or meeting facility. But in reality, a bug sweep can [...]

Security Starts with TSCM

got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the employees. He wanted to be certain that the conference room was completely secure. He asked that we complete Technical Surveillance Countermeasures (TSCM), or as it is often called, a bug sweep. He felt relatively confident that there were no eavesdropping devices or other surveillance equipment in the room, but he had to be absolutely certain. Usually listening devices are not evident to the casual observer. That’s why counter surveillance equipment [...]

Unfair Competitive Edge Can be Averted through TSCM Sweep

There are so many reasons for electronic surveillance. Just about any situation that includes a competitive element provides the impetus for covert surveillance. Corporate and industrial espionage may be what first comes to mind, but spy listening devices can be used in every industry and field. According to an ESPN article from April, 2012, there were allegations that New Orleans Saints general manager Mickey Loomis had an electronic listening device installed in the Superdome that allowed him to eavesdrop on visiting coaches for nearly three NFL seasons. Football in America is much, much more than just a game – it’s full of multi-million dollar businesses – and the competition on the field is only a small bit of the competition between the teams. Cell phone [...]

Would a Bug Sweep of your Business Uncover any Spy Equipment?

Just like an average citizen might ask who would want anything from them enough to take the time to engage in cell phone tapping, businesses across the nation might ask who would install eavesdropping devices or engage in electronic surveillance in their organizations. The answer is evident in a report from the National Counterintelligence Executive (NCIX). The report says that foreign spies account for economic espionage costing “the United States economy as much as $400 billion or more per year.” Some say that is grossly understated. Now that’s BIG BUSINESS – and not the kind U.S. business wants to see. Is your business being targeted? Corporate secrets and intellectual property are highly valued by competitors and years of research and development could be wiped out [...]

Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!

Many companies have Intellectual Property Protection insurance for protection. But insurance is only good after a theft or breach of confidential or proprietary information. Wouldn’t it be a better idea to prevent a loss before it happens? When a business hires to do a bug sweep, or more precisely, TSCM, it’s because they want to be proactive and protect proprietary corporate information from being leaked or lost. The TSCM process includes acting as a bug detector, revealing eavesdropping devices and spy equipment. But the actual bug detection services do much more. The benefits to a company or organization are much broader: Protection of damage to income and profits Continued viability of business strategy and processes Security of intellectual property Privacy, both corporate and personal is [...]

TSCM Ensures a Gift is Sincere, Not an Eavesdropping Device

With the door to technology wide open, some people think the days of phone tapping and other spy listening devices are over. They think that all covert surveillance is computer surveillance or cell phone tapping. Let me be the first to tell you, that’s not true – in the least. The stereotypical covert operation to plant eavesdropping devices still happens, but spy equipment could just as easily be carried into your offices in the hands of a presumed “friend.” A great example is a comment I caught in an article I was recently reading about gifts that business people receive. The caution was to beware of gifts from business associates or acquaintances of items that you would keep in your office – something framed or [...]

Cell Phone Spying is Illegal in the United States

There is one more reason to be glad you reside in the United States – cell phone spyware is illegal here. With the release of the Apple iPhone5 in Australia, cries can be heard about the “potential tsunami of privacy breaches” according to an article at news.com.au. The article quotes senior lecturer of Internet law at QUT Peter Black who says that “It is not uncommon for the law to lag behind technology in the sense that technology evolves very rapidly.” While that is somewhat obvious because of the nature of technology and the nature of legislation, here at , we know that the proliferation of cell phone spying is growing and become much more common. Some think it is a good way to catch [...]

Cellular Location Evidence Requires Expert Analysis

The use of cellular forensics has become a real tool for many attorneys and their clients – on both the defense and the prosecution sides of the courtroom. Although we conduct mobile device forensics or mobile phone hack detection for clients suspecting cell phone spying, we also conduct investigations using cellphone records and mobile phone tracking techniques. The complexity of cell tower tracking has grown exponentially with the number of cell phone being used today. In fact, cell tower triangulation for cellphone tracking or for locating cellular location is pretty much a misnomer. Cellphone experts say that there is no cellular tower triangulation because cell phone signals bounce from tower to tower depending not only on geographic location, but also the volume of signals in [...]

Baby Monitors as Spy Equipment? Don’t Laugh, It’s True

Did you ever think that your baby monitor could be a spy listening device? That’s right. With technology moving ahead, parents are able to connect to their baby monitors and while these eavesdropping devices are meant to keep baby safe, the can also end up being used as electronic surveillance by bad guys. How it works is that the baby monitor connects to the local Wi-Fi network and broadcasts audio to an iPhone, iPad or iPod Touch. The app for the mobile device is free to download. Audio surveillance equipment has never been easier for bad guys – at least when there’s a baby in the house. The danger is that baby monitors are being installed in homes for use with seniors, too. And we [...]

Covert Surveillance and Spy Listening Devices are Rooted Out in Bug Sweeps

The other day, I was thinking about all the people who call to ask us to install phone tapping equipment or put a mobile phone tap on a cell phone to find out the truth about someone or some situation. We won’t do that because it’s illegal, but there are other ways that are legal to get the information they want – or find out how others are getting information they shouldn’t have. One thing we often remind clients is that a cell phone is a computer. While someone may be suspicious about the activity on a spouse’s/girlfriend’s/boyfriend’s/co-worker’s phone, the user could simply be playing a game, checking a bank balance, transferring money, or even entering what they ate into an app they’re using to [...]

Go to Top