TECHNICAL SURVEILLANCE COUNTERMEASURES

Play Video

What is TSCM?

It is a terminology that has been around for many years and first developed in the government and migrated to the business and personal areas of society. TSCM or more commonly called “Bug Sweeping” was considered high-tech technology dealing with government and secure facilities.

However, with the advances in technology, it is no longer limited to the government. Today TSCM has evolved into a large-scale business that caters to businesses and individuals worldwide.

With these advances, we are more aware of our environment. Which has led us to be a more litigious society holding individuals to higher standards. To survive in our modern-day high-tech society, we now must consider and not overlook many things that were not previously in the equation. We must consider things such things as:

Corporate Espionage

Non-Disclosure Agreements

Non-Compete Agreements

Privacy Concerns

Secrecy Issues

Due Diligence

Intellectual Property Protection

Confidentially in Merger and Acquisitions

Protect Stockholders

High Profile Individuals

In the early days, of Countermeasures in the private sector, many believed they were protected with a sweep being conducted utilizing a low-tech handheld RF scanner and handheld telephone scanner. This is no longer the standard for countermeasures that are conducted today. Today, highly trained individuals utilize highly specialized and technical equipment and procedures to detect and identify clandestine compromises to a business or individual’s security.

The private sector and government agencies are now facing many modern-day issues and concerns that were not present in the twentieth century. Corporations and individuals are much more aware and concerned about protecting their physical and intellectual property. This is especially due to COVID-19 concerns. Companies and corporations are allowing more people to work from home. While convenient for many employees and executives, this could potentially add additional security threats. Companies and Governments focus on internal threats such as computer hacking and virus threats using secured servers or VPN’s. However, meetings are still being held in an unsecured location such as homes, apartments, or hotels. Increasing the opportunity for Intellectual Property (IP) theft or sensitive information to be heard. While governments or large organizations use SCIF’s (Sensitive Compartmented Information Facility) to hide their discussions, unfortunately, people from home do not have that luxury.

The Equipment

For professional TSCM / Cyber TSCM surveys to be effective, the TSCM specialist must be expertly trained and properly equipped. Eavesdroppers utilize a variety of devices and spying tactics to exploit vulnerabilities in your security protocols. They intend to access and utilize your valuable information.

Axios Investigations Firm’s eavesdropping detection equipment is constantly upgraded to meet new and emerging technical surveillance threats. This practice ensures that we are prepared and fully capable of handling all known threat levels as well as the continuous technological advancements with regards to covert Technical Surveillance Devices (TSD), Technical Security Hazards (TSH), espionage methods, techniques, compromises, and the more common non-electronic methods of compromise.

REI Oscar Green

The OSCOR Green is a portable spectrum analyzer that sweeps 24 GHz in one second to quickly detect transmitting electronic surveillance devices and ensure that spectrum activity is captured.

JJN Digital Non-Linear Junction Detector

The ORION 900 HX NLJD is made to detect and locate hidden cameras, microphones, and other electronic devices regardless of whether the surveillance device is radiating, hard wired, or turned off.

JJN Cam GX5 Cellular Activity Monitor

The CAM-GX5 is designed to detect and locate transmissions from cellular mobile phone-based devices including mobile phones, smartphones, vehicle trackers, Wi-Fi Hotspots, GSM listening devices (bugs) and covert wireless 3G/4G/5G cameras.

Yorkie Pro

Yorke-Pro sweeps all nearby Cellular, Wi-Fi, Bluetooth and BLE (Bluetooth Low Energy) channels using a high-speed receiver engine in conjunction with a Wi-Fi/BT/BLE demodulator.

Optic 2 Hidden Camera Detector

“Optic-2” is a professional hidden camera detector designed to detect and locate hidden or camouflaged camcorders and pinhole cameras, regardless of their status.

C3 Thermal Imaging System

Portability Pocket Portable Thermal Camera with Msx Enhanced Thermal Images providing stunning detail to help you identify problems.

Data Pilot 10

Data Pilot 10 aims to make it easier for digital forensic examiners to acquire evidence from mobile devices in the field and analyse it back in the lab.

Operational Capabilities

Our Qualifications

Axios Investigations Firm has over 25 years of well-rounded domestic/international experience as Technical Security Countermeasures (ITC Trained) and Security & Espionage Investigators. Our Special Agents have been at the federal, corporate, and state levels. Having served prestigiously at the National Security Agency, U.S. Special Forces, SWAT, the Drug Enforcement Administration, and BLACKWATER, USA.

Axios Investigations Firm conducts on-site assistance visits for physical security inspections, vulnerability assessments, and Technical Surveillance Countermeasures surveys at various locations throughout the USA and abroad. We also have Active Top-Secret Clearance with previous SCI clearances.