Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 13 December 2012

TSCM Bug Sweeps: When, and When Not To - Part II

Posted on 15:55 by Unknown
The following provides advice specifically meant for: 
Private Investigators, 
Security Directors, 
Security Consultants 
and TSCM professionals.

What you can do to keep your current business clients espionage-free

Technical Surveillance Countermeasures (TSCM), or bug sweep, is an analysis of an area to detect illegal covert electronic surveillance. In addition to listening devices, sweeps also take into account optical, data, and GPS tracking devices.
In TSCM Bug Sweeps: Part I we discussed how to handled requests from new clients for TSCM bug sweeps. In Part II we look at helping your current business clients. After you alert them to your business espionage solutions you will be viewed as a more valuable resource. Your revenue will also increase.

A typical case involving current business clients...

The Ostrich Effect:
Ignore the risk and maybe it will go away.

Many companies are doing very little to protect themselves against business espionage. Worse, they do not even know what protection measures are available, or where to go to find them. The natural result is “The Ostrich Effect”: ignore the risk and maybe it will go away. As their security adviser you should, and can, be helping them avoid this major disaster.

Step 1. Partner with a competent TSCM specialist.

As mentioned in Part I of this series, partner with a competent specialist. You may already have someone you know and trust. If so, great. If not, conduct a search using terms like “eavesdropping detection”, or simply “TSCM”. Once you have found specialists to vet, ask plenty of questions. If you are not sure of what to ask, search “TSCM compare” for a list of questions. Qualify your specialist with questions, but be sure to note their professionalism too. Their presentation and demeanor will reflect on you.

Knowing a good TSCM specialist will make the rest of the steps very easy for you. (more) (Part 1)

Steps 2-4 comprise the rest of this article.
Take-away point: If you don’t help your clients, another person reading this post will.
~Kevin

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in advice, TSCM | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ►  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ▼  2012 (84)
    • ▼  December (33)
      • 2013 at the International Spy Museum
      • Predicting Personal Aerial Surveillance – Drone On
      • Are They Tracking You? - Government Cell Phone Sur...
      • Turkish PM: Five Electronic Surveillance Devices F...
      • See Two App Store Icons on Your Phone? Beware.
      • Putting Spyware on Daughter's Phone Nets Restraini...
      • Remember the spy who was found dead in a duffle ba...
      • Wiretapping Sweeps Over China
      • Repeat after me, class, "Emails are postcards."
      • Christmas, and another phone company Pontius Pilat...
      • KGB: We Bugged Royals (We're shocked.)
      • Three Years of Privacy Stories - Wall Street Journal
      • Android Virus Uses Your Phone to Spread Spam
      • SpyCam Story #664 - This Month In SpyCam News
      • Florida Man Convicted in Wiretapping Scheme Target...
      • Android Malware Among Top Threats for 2013
      • FutureWatch: New TSCM Tool on the Far Horizon
      • The Bugging Report Too Dangerous to be Released
      • " I heard that law enforcement has some sort of sc...
      • Dockworkers Union Alleges Eavesdropping - West Coa...
      • Top 5 Wireless Tips for IT Pros
      • UPDATE: From our "Persistence is Futile" file...
      • Google Funds Spy Technology - Surveillance to the ...
      • UPDATE: $50 Hacking Device Opens Millions of Hotel...
      • NCTC Scope "Breathtaking" - "Pre-Cogs" - fiction t...
      • 2012 - Targeting U.S. Technologies Report Out
      • Security Flaw – Samsung Handsets & Tablets
      • TSCM Bug Sweeps: When, and When Not To - Part II
      • Feeb to Fed Xmas Files Secret Flash Sale
      • How to secure your Android phone - 14 Tips
      • Bus-ted... Public Buses Quietly Adding Microphones...
      • "Get me Bond. I'm ticked at the watchmakers."
      • Pictures at the NSA's 60th anniversary
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile