Security ID Australia was formed in 2008 to provide TSCM services for the business community in the Mackay region. In 2013 we then moved our operation to Brisbane so that we could better serve our clients.
TSCM Technical Surveillance Counter-Measures
A TSCM survey is a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility.
Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver and a spectrum analyser. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively.
Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect. There are a number of options for detecting such bugs. Very sensitive equipment can be used to look for magnetic fields, or for the characteristic electrical noise emitted by the computerised technology in digital tape recorders. If the place being monitored has many computers, photocopiers or other pieces of electrical equipment installed, it may become very difficult to locate bugs. Items such as audio recorders can also be very difficult to detect using electronic equipment. This is why TCSM is important. The equipment we use is designed to locate the harder to find leakages.
We are now seeing more audio and data leakage happening via the IT infrastructure, whether that be a compromised server or workstation, hacked VoIP phones and even compromised printers.
Information is one of the most important assets of any business today. With the proliferation and ease of access to eavesdropping devices and miniature cameras through retail stores and the internet, combined with the threat of traditional commercial espionage, there is an increasing risk of your information being compromised.ountermeasures (ECM).