The protection of private and confidential information has become a major concern over the past decade as the advanced transmission of often vital, sensitive information has become commonplace in our society. The technology involved in such transmission has opened up many new potential compromises and vulnerabilities that can directly or indirectly affect every person, business, corporate and government entity.
Have you ever had the uneasy feeling that your private and confidential correspondence, conversations, communications, or other forms of sensitive information were not as private as you would like? If so, you may be the victim of one of the many difference forms of covert surveillance, electronic harassment, audio or visual eavesdropping, espionage or the target of an intelligence-gathering operation.
Covert surveillance may be electronic in nature or by a wide range of intelligence gathering techniques.
In fact, both of these methods are widely used in domestic spying, stalking incidents, gaining a business competitive advantage (internal or external, labor related disputes, or dissatisfied or disgruntled employees hoping to gain an edge within the workplace environment. In fact, both of these methods are widely used in domestic spying, stalking incidents, gaining a business competitive advantage (internal or external, labor related disputes, or dissatisfied or disgruntled employees hoping to gain an edge within the workplace environment.
This interception, theft, and even sabotage of business or personal information has resulted in a significant demand to find ways to safeguard it, detect intrusions and develop countermeasures.
It is our experience at the Technical Security Branch (TSB) that most people who have reason to question whether or not they have justification to be concerned – do in fact have reason to be concerned!
In fact, the following section provides some statistics:
TSB Statistical Findings
During the past thirty (35) years TSB personnel have conducted Technical Surveillance Countermeasure (TSCM) sweeps, and Counter-intelligence Surveys numbering in the thousands, with the following statistical results.
In 22% of these inspections, one (1) or more actual functioning electronic devices were discovered and removed by our Technical Security Specialists (TSS), or we were able to verify a non-electronic compromise of confidential proprietary information.
Of this 22%, 8% were of a domestic nature, 13% were related to business interests or corporate affairs, and 1% were related to covert vehicle tracking technology or Emergency Locator Transmitters (ELT) and Emergency Position Indicating Radio Beacon (EPIRB).
In 22% of the inspections, positive proof was discovered to indicate a device was present or had been removed prior to the investigation, or strong evidence suggested that a real compromise had indeed taken place.
- In 23% of the inspections the loss of information appeared real, however no specific evidence was discovered to confirm that a compromise had actually taken place. However, In 12% of these cases the client indicated making the call to our office from a area of compromise or discussing his / her suspicions with others.
- In 31% of the inspections conducted, no compromise could be proven and no evidence was discovered to confirm any compromise had taken place. However, in 19% of these inspections, the investigation was initiated by the client as a preventative measure, usually without any specific reason for initiating the investigation, other than due diligence.
- In 24% of all inspections conducted, it appeared that the client’s suspicions were unfounded, or as the result of a paranoid mind, often created by other events of coincidence.
In our best estimation, it would also appear that in approximately 67% of the TSCM services preformed by our Technical Security Specialists (TSS), the client was not totally forthcoming as to the real reason for contracting our services, and therefore the actual risk could not be properly identified or established.
It should also be noted that our Technical Security Specialists (TSS) identified potential compromises in 100% of these TSCM inspections and provided recommendations to correct and improve the technical security posture of the target facility, area or residential property.
Recognizing the Signs
- Confidential information appears to have become common knowledge beyond mere or reasonably explained coincidence.
- Others know about specific details of your personal and private business affairs. Please understand that in most true intelligence gathering scenarios, the attacker is not going to allow such clues to become known to the victim of the interception.
- You experience an unexplained break-in at your residence or business and nothing obvious appears to have been taken. This is the type of situation that should prompt a due diligence TSCM inspection.
- Door or window locks appear to have been tampered with or left vulnerable, suggesting covert entry may have occurred. This may also be an indication of other types of crime beyond interception of communication.
- Interference has developed on your television (off air signals, not cable television). There are many other explanations for this occurrence and rarely is it due to eavesdropping devices given the vast amount of RF interference present.
- A radio has started drifting off frequency or interference has recently developed. There are many other explanations for this occurrence and rarely is it due to eavesdropping devices given the vast amount of RF interference present.
- Evidence suggests that ceiling tiles or panels have been removed in an office or boardroom setting.
- Debris or dry-wall powder is observed on the floor or furniture indicating a possible technical compromise.
- Wall plate covers for telephone, switches, and outlets appear to have been removed and replaced.
- You notice unusual tones, sounds, or noise (static) on your telephone. Although, this complaint is quite common, it rarely is the result of wire-tapping.
- You notice changes in the volume or line quality when on the telephone.
- You detect possible surveillance around your residence or place of business.
- Information has come to light to suggest illegal electronic (eavesdropping) or monitoring of your personal or business communication may be occurring.
- Due diligence is the best practice when you feel you are at risk of potential compromise and it is recommended that most business and corporate environments conduct periodic TSCM inspections on monthly, quarterly, or annually depending on the perceived threat level encountered.
Determining the Risk Factor of a Technical Compromise
Generally, individuals who or companies that have influence, money, power, or access to sensitive or classified information are at the greatest risk of a potential compromise.
Determining the risk factor is the single most important issue in deciding whether professional Technical Security Countermeasures (TSCM) assistance is required. It is a complex process where the value of the information is assessed against the motives, knowledge, methods and technology available to the potential eavesdropper. One also needs to consider that such intrusions are not necessarily limited to a single event. When someone is absolutely committed to the task of intercepting your confidential information, over time, he or she may apply a wide variety of information gathering methods and techniques. It is for this reason that a properly implemented TSCM program is always better than simply conducting a one (1) time sweep, especially when the stakes are high or the potential threat is real.
How and Where to Begin
To begin, potential clients should consider 2 important questions that will help determine the perceived threat / risk level and if the services of professional TSCM personnel will be required:
-
Who would benefit from obtaining the sensitive information that you control?
-
What is the actual real dollar value of that information?
Consider this last question carefully! Many clients greatly undervalue their proprietary information.
After reviewing the perceived threat / risk level, and if you believe that you or your information has been compromised:
- Do nothing that might tip-off the eavesdropper;
- Avoid discussing your plans to contract our services with others whenever possible; The eavesdropper is often someone on the inside; and
- Do try to maintain a normal workplace environment with the exception of any activities related to the handling or transmission of classified or sensitive information. These must be suspended until an assessment and/or inspection has been undertaken.
- Contact the Technical Security Branch (TSB) from a secure location using a secure form of communication. We will then walk you through the TSB Threat Level Determination
TSB Ethics
The Technical Security Branch (TSB) of Professional Development TSCM Group Inc., does not rent, sell, install or supply information on eavesdropping methods, equipment or interception devices, nor provide information about the source of such equipment.
It is extremely important to seek legal advice before undertaking any activity relating to the interception and use of private or confidential communication. There are strict laws relating to the interception of private communication and transmitted data that differ from country to country.
The Technical Security Branch (TSB) and our personnel always maintain strict client confidentiality, and have implemented conflict of interest guidelines.
Our Technical Security Specialist’s (TSS) determine the perceived threat level, and type of sweep activities necessary, based primarily on information supplied by the client in this regard. It is important that the client or his / her representative be as candid as possible regarding the true reason for contacting our office.
When inquiring about our Technical Surveillance Countermeasures (TSCM) and Counter Intelligence Services, be sure to use a pay telephone or other secure communication method to prevent tipping off a potential eavesdropper. Avoid discussing your plans to contract our services with others whenever possible – Often times the eavesdropper is someone on the inside, or may have access to sensitive internal company information.
The professional advice you will receive from a qualified Technical Security Specialist (TSS) TM will likely be quite different than that of untrained marketing types and sub-par operators.
The Technical Security Branch (TSB) does not engage in the installation of interception related devices or equipment, nor do we supply interception relating training for this purpose.
Unlike many of the spy supply shops that will offer one customer covert listening and interception devices, and then offer another customer TSCM related (debugging) services, the Technical Security Branch (TSB) operates under a strict code of ethics, professional standards and conflict of interest protocol.
We are able to offer a totally independent and objective Technical Security (TS) inspection or review of the client’s residence, vehicle, or business environment and all of our employees meet strict security clearance and will provide a signed Non-Disclosure Agreement (NDA) when requested or required by the client.
Professional Development TSCM Group Inc., utilizes only TSB Certified Technical Security Specialist’s (TSS) and the most advanced Equipment Resources available.
The TSB utilizes advanced professional equipment resources manufactured by nearly every major TSCM, telecommunications and test and measurement manufacturers in Canada, the United States and Internationally.
The TSB will provide full disclosure of the equipment, methods and techniques, capabilities and limitations and the expected value to be gained by completing the client authorized Scope of Work.
Electronic Harrassment
The Government of Canada (GOC) does not engage in targeting private individuals or others from an electronic harassment point of view, nor does the government target individuals with mind control, RF radiating devices, or engage in illegal forms of satellite tracking and monitoring of individual citizens 24 hours a day, 7 days a week.
If this is your belief and / or concern, please seek an appropriate medical consultation or solution first rather than wasting your time and money on trying to prove you are a so-called “targeted individual” or “victim” of some top secret government program that only you are apparently aware of based on questionable Internet based research.
Professional Development TSCM Group Inc., will only accept Electronic Harassment related assignments where there is a reasonable chance that we might bring some piece of mind to the client as a result of having conducted an electronic sweep of their premises or the reason for the request is based on reasonable evidence that a compromise may exist in some other capacity.
We strongly recommend that you seek the advise of legal counsel and have them contact our office to request our TSCM professional services in these circumstances.
Please feel free to contact us for clarification of our professional service policy or basic advice regarding your individual circumstances.
Please be aware that there are many sub-par operators who will be happy to take your money and offer little or nothing in return
Word of Warning
It is an unfortunate reality that there is an entire industry of fly-by-night marketing types selling a wide range of TSCM equipment and services to the public and corporations, who get caught up in the “Spy” phenomena and buy into slick marketing.
Whether consciously or by negligence, these fly-by-night operators provide so-called TSCM inspections of limited or absolutely no value what so ever.
These services do little more than further degrade the overall technical security posture of the target facility and instill a dangerous false sense of security in the mind of the clients relying on their sub par services.
Sadly, many of these sub-par operators are associated with normally reputable security and investigation agencies and lack the specialized equipment required, current certification training, operational experience and ethical standards expected by the end-user client, if they only new.
Before contracting TSCM related services you should determine the experience and reputation of the actual TSCM operator and obtain a comprehensive list of the actual equipment resources that will be utilized during the inspection.
Please understand that you will need to answer one (1) very important question for yourself before contacting Professional Development TSCM Group Inc.
If I contract the professional TSCM (Debugging) services of PDTG to conduct a Technical Surveillance Countermeasures (TSCM) inspection, am I prepared to accept the results, findings and / or observations provided by the TSB certified Technical Security Specialist (TSS) who attends and completes the TSCM inspection?
If the answer is no, or you are not sure, PDTG is not the company for you and we wish you all the best in resolving your technical security concerns or situation.