Technical Surveillance Counter Measures

TCSM is a counter intelligence measure used to detect or eradicate any attempts made to gain information or data, which may be classed as privileged, confidential or personal.

This information or data may be gained unknowingly or unlawfully through the use of an array of eavesdropping, listening and other transmitting devices.

There are three levels of attribution:

1. On what device did the attack originate?
2. Who controlled the machine?
3. Who was that person working for?


Levels of Attribution (Technical surveillance counter measures)

First Level

On what device did the attack originate?

The first level, and in some cases the second, can be achieved primarily through electronic means, with sufficient time.

Scanning a series of rooms or a space for hidden devices that transmit via a range of frequencies to firstly generate an RF spectrum footprint of the area and then to examine RF spikes to enable them to be identified as safe.

Second Level

Who controlled the machine?

Physical and technical inspection of electrical devices, telecommunications and IT systems are undertaken to search for hidden “hard-wired” microphones and or covert cameras. The in depth inspection of telecommunications devices, includes each handset and socket; through to internal and external exchange levels.

Third Level

Who was the person working for?

The third level usually requires additional intelligence means and methods of discovery.

As a market leader, our knowledge and experience firmly places Specialist Security Services at the fore of counter measure device deployment.

Our team will provide a full and comprehensive TCSM report on your existing security practices and make recommendations on enhancements that are realistic and cost effective.

Including the inspection of Walls, floors, ceilings and ducts are all inspected and scanned for any hidden, redundant devices or wiring.

Request an Appointment

Contact Specialist Security Services for a private consultation to outline your requirements.