Corporate espionage costs businesses more than $400 billion yearly. Corporate information theft implements can range from cyber attacks to simple bugging devices. The spy may be anyone with a motive. Insiders, ex-employees, competitors, activists, private investigators, foreigners and others can target your business. It’s hard to predict who is hiding behind the corporate espionage mask.
Preventing the success of corporate espionage attempts is a challenge. Misconceptions about cybersecurity can leave companies vulnerable. Your cybersecurity team can’t detect all cyber threats. Your cybersecurity team also cannot detect electronic eavesdropping devices. To protect valuable corporate information from successful corporate espionage attempts, TSCM and Cyber TSCM are needed. ComSec LLC offers tools to help you integrate TSCM and Cyber TSCM in your risk management program. The integration will help you better protect corporate information from corporate espionage attacks!
TSCM Services
TSCM is an acronym for Technical Surveillance Countermeasures. The term refers to methods used to detect, negate and exploit penetration technologies. TSCM involves the methods and technologies used to detect illegal eavesdropping. Technical surveillance is one way a spy can steal your corporate information. Corporate espionage has been conducted using electronic eavesdropping devices for decades.
ComSec’s TSCM service includes a physical and electronic survey to detect audio and optical threats. We detect telephone taps, wireless transmitters, wire and mic taps. We also detect laser and infrared eavesdropping devices, carrier current bugs, micro wireless video devices, and other elicit eavesdropping devices. We can detect complex, expensive bugging devices as well as inexpensive devices.
Why is TSCM important in preventing corporate espionage attacks? Intellectual property should not be stored on your network. Intellectual property that is not stored on your network is not detectable by your cybersecurity measures. Intellectual property theft requires the spy to capture corporate information another way. Audio recording devices, video recorders and keyloggers are examples of devices used to steal corporate information.
Corporate information stored on the network requires other considerations. Corporate espionage via electronic eavesdropping tends to increase as cybersecurity programs become more effective. The spies will choose the path of least resistance. A strong cybersecurity program is important. But, it makes TSCM / Cyber TSCM a more important element of your risk management strategy. Learn more.
Cyber TSCM
Personnel charged with maintaining your cybersecurity program are trained to detect network threats. They can’t detect eavesdropping devices that exploit the cellular network. They also can not detect hybrid devices (e.g. data cables with embedded eavesdropping devices).
Our Cyber TSCM services detect electronic eavesdropping devices that operate via remote access attack. We also detect devices that use GSM, 3G or 4G remote cellular networks to access to your sensitive data. These devices enable cyber intruders access to your data from anywhere in the world via a mobile phone signal. Read a IMSI catcher case study. Our Cyber TSCM services also detect anomalies associated with Advanced Persistent Threats (APT) attacks.
Corporate information stored on your networks may be at risk if you are relying on your cybersecurity controls to protect it. Not all corporate espionage involves collection of large amounts of data. A foreign national spy may need just one specific document stored on your network. If your risk management program doesn’t include Cyber TSCM, you’ve made the job of the corporate spy much easier. Protecting corporate information from corporate espionage cyber threats is important. Learn more.
The Assurance Option
The Assurance Option is a preemptive corporate espionage prevention strategy. The program begins following a full scope TSCM and Cyber TSCM service. The Assurance Options is a series of TSCM and Cyber TSCM inspections completed over a period of time. The time period may be event or circumstance driven. Each Assurance Option begins with a technical threat assessment covering changes since the last inspection. It highlights vulnerabilities created or resulting from these changes. An inspection plan is then initiated. Recommendations are then made to help you protect corporate information from corporate espionage attacks.
Why is routine TSCM / Cyber TSCM important? Changes in your corporate environment present new corporate espionage risks. Changing the location of your office? The IT Director left abruptly? The C-suite offices were remodeled? Customers are not renewing contracts for any obvious reasons? Competitors know your sales strategy before it’s fully implemented? New product information is released before the official launch? All of these issues signal the possibility that electronic eavesdropping devices or new Cyber TSCM related threats are present. Failing to detect issues early can damage your company brand and the financial losses can be devastating. Corporate espionage is a threat to the longevity and success of your enterprise. Learn more.
In Summary
Corporate espionage is costly. It can damage the corporate brand. Corporate espionage can also be devastating to corporate finances. Protecting corporate information from corporate espionage requires more than a vigilant cybersecurity program. The executive board and C-suite have a responsibility to protect corporate information from corporate espionage. Choosing not to include TSCM and Cyber TSCM in your corporate risk management strategy is a risky choice. Spies will exploit your vulnerabilities. As cybersecurity programs become more vigilant, the likelihood of electronic eavesdropping increases.
If your company values your corporate information, TSCM and Cyber TSCM are a must! By incorporating The Assurance Option in your risk management strategy, your company closes critical gaps in its corporate espionage defenses. Change happens in business. Ensuring those changes do not create significant vulnerabilities is part of an effective overall risk management strategy. Don’t let the spies capture your corporate information by leaving gaps they can exploit!
To learn more about ComSec LLC’s TSCM / Cyber TSCM corporate espionage services contact us!
About the Author:
J.D. LeaSure (CCISM) is the President/CEO of ComSec LLC, a global provider of world-class counterespionage and TSCM / Cyber TSCM™ services. Learn more at https://comsecllc.com
*Cyber TSCM ™ is a trade mark of ComSec LLC
© 2015 ComSec LLC. All rights reserved.