What We Do During An
Advanced Electronic Security Company's Technical Surveillance Countermeasures personnel use only state of the art electronic countermeasure equipment along with a methodical physical inspection of the suspect target area to identify potential unauthorized monitoring devices. The result is greatly reduced risk of compromise and enhanced peace of mind. Helpful recommendations on prevention lead to an improved overall security position of our client's sensitive and confidential information.
Description of TSCM Services Performed
Telephone System and Telecommunication Network Analysis
Detailed Physical Inspection
Radio Frequency Spectrum Analysis
Counter Intelligence Threat Analysis
Tape Recorder Detection
Wire / Cable Source Tracing and Identification
Carrier Current Detection
Radio Frequency Video Transmission Detection
Laser / Infrared Detection
Microphone Element Detection
Acoustical Leakage Verification
All or some of the above methods are used to insure the client's
confidential information remains confidential. During a Technical Surveillance
Countermeasures inspection, a comprehensive threat assessment will be made of
all designated target areas and a plan developed to best implement the TSCM
sweep. A preliminary silent sweep will be conducted to attempt to locate
eavesdropping devices while they are in operation without alerting any potential
- A full radio frequency (RF) spectrum analysis will be performed to check for
hidden radio transmitters and parasitic radio frequency telephone transmitters.
- Electrical wires will be inspected with specialized equipment in
order to locate line carrier current devices.
- A complete and thorough physical inspection of all designated
target areas identified during the sweep, as well as the geographical areas
surrounding the target areas.
- All target area telephones, telephone lines, and related
telecommunication equipment receive a complete electronic analysis and physical inspection.
- A full verbal report will be given immediately upon completion of the
sweep, and a detailed written report, if necessary, will be submitted.
- Recommendations based on our findings will always be provided to
enhance our client's protection of confidential information and
communications after the sweep.
Over 30 years Experience
Do Not Text
PLEASE DO NOT CONTACT US FROM A SUSPECT TELEPHONE OR FACILITY WHEN INQUIRING ABOUT OUR DEBUGGING SWEEP SERVICES AND SURVEYS