TSCM involves conducting an exhaustive and meticulous physical inspection using electronic surveillance for all covert cameras, telephone transmitters and/or room bugs. But what happens if you believe you have had a compromise?

Our Threefold Approach

As experts in this field and listening device deployment practioners (“planting”) ourselves, we are familiar with what’s on the market and the supply chain surrounding technical bugs and the tactics used in their deployment. If you suspect there is a TSCM Incident in your premises then contact us straight away using a clean phone line or PC away from the area of concern.

Threat actors will actively monitor their deployed ‘bugs’ for any sign of detection and so the identification and removal of any commercial espionage device needs to be done carefully and cautiously to maximise the chance of identifying the perpetrator.

  • Cyber TSCM Risk Assessment

  • Bug Sweeps –  a thorough physical and electronic search of the area under study

  • Assisting in implementing corrective actions, recommendations and preventative measures

  • Espionage training awareness to all levels of staff

THE SINGLE GREATEST ASSET HELD BY MOST COMPANIES IS THEIR INFORMATION.