Technical Surveillance Countermeasures (TSCM)
Technical surveillance countermeasures (TSCM) is a term created by the United States government that describes the action of sweeping for devices that may be spying on you. Originally, TSCM were aimed at sweeping rooms just for listening devices.
Detection of Espionage Equipment, Digitpol provides TSCM services to detect surveillance, spying and interception. Digitpol can assist with all sweeping services related to detection of eavesdropping and espionage equipment. Spying devices and espionage equipment are easily available nowadays and the problem with commercial spying is rampant, Digitpol utilises military grade detection tools and will discover any form of espionage equipment.
Is your team been monitored or do you suspect covert surveillance equipment is installed ?
Modern surveillance equipment can be placed in an office or car, foreign spy agencies and bad actors have found various ways to accomplish this.
Foreign governments, competing corporations, and private information gatherers frequently resort to the use of electronic surveillance devices to gain a competitive advantage in the market place. Others may use it to obtain compromising information that can be employed for a variety of uses ranging from simple embarrassment to blackmail.
Even the most vigilant security measures cannot rule out all incidents of illegal activity, clandestine or covert efforts and devices that can compromise sensitive information, privacy, and confidentiality. We will find anything even if it sleeps or operates on specific times.
Digitpol Signals and Intelligence Unit performs Technical Surveillance Counter Measures (TSCM) services in a procedural approach. The approach to every case is conducted in a step by step and every detail during the search is recorded and a written report is issued at the end of each search, the written report details the timestamp of each testing and the findings along with digital printouts, sweeping device reports and photos, our final report is a comprehensive report that includes all anomalies and findings. We only provide this service to corporate agencies.
Tools We Use:
To conduct a TSCM search many different tools are required, the basics are the industry standard from REI such as FLIR, Oscar Red, Ocsar Green and we them on standby and ready.
- The Kestrel TSCM
- Predator RF Hunter 20 GHz Spectrum Analysis Kit
- REI OSCOR Blue & Green
- ORION HX NON LINEAR JUNCTION DETECTOR
- FLIR on tripod and handheld
- High grade spectrum analyzers (27ghz)
- WiFi and Bluetooth analyzers
- Monitoring of LAN networks for unauthorized traffic
- Analysis of VoIP services for unauthorized traffic
Detection of Spying Equipment
Our sensor based TSCM module allows for monitoring in more locations with networking capabilities purpose built for remote and in-place spectrum monitoring. We can detect in real time new devices and prevent in real time listening equipment and active surveillance.
The TSCM tool set we deploy features a sweep rate of 28 GHz/s at 10 kHz RBW and 40 MHz IBW and advanced triggering capabilities, we can capture short duration or faint signals of interest with a higher probability. By conduct deeper analysis with patented software-defined spectrum analysis technology which enables wide bandwidths, deep dynamic range, and 9 kHz – 27 GHz frequency range.
WiFi Networks, Find Flaws, Detect Rogue Devices and Secure Networks.
Digitpol Cyber Crime Team specialise in wireless network analysis, we offer RF site surveying, WiFi analysis, Secured wireless network installation and Wi-Fi security services for private and public Wi-Fi hotspot networks.
We perform Surveys to record all Wi-Fi networks on the 2.4GHz and 5GHz spectrum to determine what devices are on your network and if any rogue devices are present. We conduct pen testing on your network via Wi-Fi. We don’t need to access your offices to perform the tests.
Should I Be Concerned who’s on my WiFi?
Are you concerned about information loss or business secrets being targeted over WiFI? A small amount of information could be worth millions to the right people or could damage important negotiations. Loss of confidential information such as executive schedules could even put lives in danger. Traditional physical security and cyber security are important, but there are many gaps they leave unprotected. To ensure all is in order, a WiFi security sweep with a detailed report would provide an insight to any, technical surveillance issues.
Dedicated to TSCM, Technical Surveillance Countermeasures.
Providing RF and signal analysis is a key part of our daily business. We maintain the highest standards in both technology and training which is necessary to combat today’s threats. We deploy a mobile forensic unit that is equipped with all RF detection and analysis tools.
Our technicians have extensive experience in multiple areas of RF security and wireless technology. We are certified in TCM and Forensic analysis of Wireless Networks.
The most complex sweep is on a vehicle, due to the complex of vehicles wiring harness known as a CAN BUS network, the sweep includes CAN BUS network traffic, voltage across the networks, amp load at rest, FLIR and an inspection of the entire vehicle, interior, exterior and undercarriage. To conduct a full TSCM on a vehicle, the vehicle needs to be kept in a faraday tent for 48h.