TSCM involves conducting an exhaustive and meticulous physical inspection using electronic surveillance for all covert cameras, telephone transmitters and/or room bugs. But what happens if you believe you have had a compromise?
Our Threefold Approach
As experts in this field and listening device deployment practioners (“planting”) ourselves, we are familiar with what’s on the market and the supply chain surrounding technical bugs and the tactics used in their deployment. If you suspect there is a TSCM Incident in your premises then contact us straight away using a clean phone line or PC away from the area of concern.
Threat actors will actively monitor their deployed ‘bugs’ for any sign of detection and so the identification and removal of any commercial espionage device needs to be done carefully and cautiously to maximise the chance of identifying the perpetrator.