TSCM Overview

Eavesdropping, Surveillance, and Espionage isn't just something that happens in the movies. Corporate or Economic Espionage has become a multi-billion-dollar industry fueled by the marketing of sophisticated spy technology to companies who are deploying covert technology against one another on an unprecedented scale.

TSCM (technical surveillance counter-measures) also denotes the process of bug-sweeping or electronic counter-surveillance. The purpose of the TSCM service is to search for eavesdropping technical listening devices, hidden cameras, telephone bugging or any technical device that may have been illegally and covertly deployed in a meeting room, office, boardroom, private residence, vehicle or aircraft.

The United States Department of Defense defines a TSCM survey as, “Techniques and measures to detect, neutralize, and/or exploit a wide variety of hostile and foreign penetration technologies that are used to obtain unauthorized access to classified and sensitive information.”

At GSC, our TSCM assessments will provide a systematic physical and electronic examination of a designated area by properly trained, qualified and equipped technical security specialists in an effort to discover electronic surveillance devices.

When will you require TSCM services?

Anyone can be the subject of illegal covert eavesdropping. However, some organizations and people can be at higher risks than others, due to the very nature of the company or individual profile. The following are some examples:

  • Competitive Sensitive Contract Negotiations
  • Initial Public Offering
  • Merger/Acquisition Information
  • Classified/Sensitive Information
  • Confidential Meetings
  • Financial Information
  • New Product Developments
  • Industrial Espionage, etc.

GSC provides TSCM services to all levels of industry and private individuals alike. Our goal is to offer un-paralleled service through the use of state-of-the-art equipment, experience and accredited training.
We offer a comprehenisive assortment of TSCM services:

  • Corporate & Residential Bug Sweeps
  • TSCM CyberSec+ Assessments
  • Radio Frequency Analysis
  • Off Site Monitoring (RF Monitoring)
  • In-place Monitoring (IPM) -- Live Monitoring / Surveillance of a Meeting
  • Telephony Inspection
  • Hidden Video Camera Detection
  • Celebrity Protection Support
  • Executive Consultation
  • Vehicles and Aircraft

As result of any services provided, you will receive a report with detailed Findings and Recommendations.

What if you suspect you've been compromised?

The following are helpful guidelines:

  • DO NOT use your work phone or cell in the office to discuss your suspicions
  • DO leave the area and find a secure location to call
  • DO NOT discuss your concerns with others while in the office
  • DO NOT use your work computer to send e-mails about your concerns
  • DO engage the services of a qualified specialist immediately
  • DO continue to conduct business as normal