Counter Surveillance

ComSec, LLC, Risk Management, Virginia Beach, VA

What is Counter Surveillance

Counter SurveillanceCounter surveillance refers to identifying, locating and neutralizing surreptitious electronic surveillance devices and technical security threats within a survey area(s). This is commonly referred to as technical surveillance countermeasures or electronic eavesdropping detection. A skilled and well trained counter surveillance professional uses a variety of specialized equipment to perform counter surveillance services. The survey process is methodical and technically complex. Both active transmitting and passive electronic eavesdropping devices are detected. As well, the signals of authorized and illicit electronic devices in the survey area are detected. Illicit or surreptitious signals are identified and their behavior is analyzed. Thereafter, the associated surreptitious device(s) are located and dealt with under Client direction. Counter surveillance threats are also identified during the survey process.

Counter surveillance also includes identifying hardware or software solutions that can be implemented to address threats and counter future spying attacks.

What is Illicit Technical Surveillance

Counter SurveillanceIllicit technical surveillance is accomplished using covert spying gadgets and techniques such as:

  • Audio and/or video bugs
  • Hidden cameras
  • Wi-Fi intrusions/penetrations
  • Covert networks and/or access points
  • Illicit use of devices not intended for surveillance purposes
  • Hybrid spying gadgets
  • Spyware/malware programs
  • GPS trackers
  • IMSI catchers
  • And more.

Our Spy Gadgets page provides examples of the types of electronic eavesdropping devices that are readily available.

The illicit technical surveillance bugs facilitate penetration of technical security measures and provide unauthorized access to information. In commercial spaces, technical surveillance bugs may be implemented by insider threat actors, visitors, third party service providers (e.g. after hours cleaning crew), occupants of neighboring suites/buildings/units, users of personal electronic devices (BYOD), etc. As well, threat exploits may be executed from within the survey area, neighboring buildings or units, mobile surveillance vehicles, in range cellular IMSI catchers, etc.

Counter Surveillance Services

Professional Counter Surveillance Services detect:

Technical Surveillance Countermeasures | TSCM

  • Active Bugs
  • Passive or Switched Off Bugs
  • Hybrid Bugs
  • Surreptitious Networks & Access Points
  • Illicit IMSI Catchers

ComSec LLC’s professional counter services include:

  • Technical Threat Assessment
  • Physical Inspection
  • TSCM Survey
  • Cyber TSCM Survey
  • Network Survey
  • Verbal Debrief
  • Formal Survey Report; and
  • Information to Counter Eavesdropping Attacks and Improve Technical Security Posture

Information gathered during the threat assessment helps the TSCM Specialist understand the Client’s risk of exposure. These risks may include events such as changes in management, a lawsuit, new ownership, moving into a new location, construction or a remodel, a break in, changes in key leadership, etc.

Visual inspection provides clues about modifications, movement or tampering with physical structures that may signify the presence or removal of surveillance devices. As well, our visual inspection can identify spying devices.

Our TSCM services detect non-network associated or connected spying gadgets. These bugs generally require the spy to re-enter targeted spaces to collect the spying device and the information collected.

Network associated or connected devices, as well as surreptitious networks and access points are detected during the Cyber TSCM and Network survey. Hybrid spying gadgets are also in the Cyber TSCM survey, as are illicit IMSI catchers.

The TSCM Specialist should provide the Client with a verbal debrief at the conclusion of the counter surveillance services. The debrief indicates the results of the services, including any technical surveillance devices and/or threats detected.

The formal survey report includes the results of the survey. This includes survey location and areas, equipment used, results of the survey and counter surveillance recommendations to improve technical security posture.

REQUEST QUOTE

 

Learn More About ComSec LLC’s Services:

The Cyber Surveillance Factor

Am I Bugged - Business Technical SurveillanceCyber surveillance devices have removed geographical boundaries from the electronic eavesdropping equation. They make it possible for an eavesdropper to collect your information from anywhere in the world. And, at the same time the risk of the cyber eavesdropper being caught while they accessing your information is lower. Why? Because the spy can use a network (e.g. Wi-Fi, bluetooth or the cellular network) or surreptitious access point to send the information to their location. That means they don’t have to come back into your area to collect the bug to get access to the information.

And, cyber bugs are often sound or motion activated. So, they collect and store the information, and then burst it forward to the eavesdropper. This functionality conserves energy, lengthens the battery life, and increases the length of time the device can capture information. The eavesdropper may also be able to call into the bug, and listen at any time. And, the use of virtual private networks (VPN), spoofing apps, burner phone apps, etc. can further mask the identity and/or location of the electronic eavesdropper.

Complete a Contact Form or Call ComSec LLC at 1-800-615-0392 for Professional Counter Surveillance Services!

Counter Surveillance Equipment

Counter Surveillance EquipmentOur professional counter surveillance equipment meets the needs of skilled technical operators to those new to the profession. From handheld counter surveillance tools to covert field ready TSCM RF Signal Analysis kits, our counter surveillance equipment is among the best available.

We believe in the quality, reliability and effectiveness of the equipment we sell. In fact, our TSCM/Cyber TSCM Specialists thoroughly evaluate the equipment that we offer for its technological merits.

Learn more about our equipment offerings.

 

About ComSec LLC

Technical Surveillance Countermeasures TSCM

We are a leading provider of Counter Surveillance Services in the USA, and globally. Our customers include government, military, corporations, non-profits, dignitaries, celebrities, executives, HNWIs, and other high risk individuals. We serve Fortune 100 businesses to small businesses. And, our residential clients include business owners, executives and others who believe their privacy has been compromised.

ComSec LLC uses proprietary detection methodologies, skilled TSCM Specialists and a variety of advanced detection equipment. We also update our methodologies and technical equipment to ensure we are able to detect electronic eavesdropping devices and threats from the low tech, inexpensive to the most advanced. Above all, our electronic eavesdropping device detection capability and our ability to restore privacy are what our company is renowned for.

ComSec LLC also provides professional counter surveillance equipment to government, military, law enforcement and businesses. Our TSCM Experts personally qualify the equipment sold, which is also approved for use in performance of our services.

REQUEST QUOTE