TCSM is a counter intelligence measure used to detect or eradicate any attempts made to gain information or data, which may be classed as privileged, confidential or personal.
This information or data may be gained unknowingly or unlawfully through the use of an array of eavesdropping, listening and other transmitting devices.
There are three levels of attribution:
1. On what device did the attack originate?
2. Who controlled the machine?
3. Who was that person working for?