Frequently Asked Questions

TSCM FAQ’s. Questions to consider before you select a TSCM service provider:

Question: Who is a likely target for electronic eavesdropping? 

Answer: While any business, organization or individual, can be a targeted, there are certain targets eavesdroppers prefer. Industries, such as healthcare, energy, utilities, agriculture, chemical and green technologies, are prime targets of electronic eavesdropping. Also, individuals who serve in a leadership or technical capacity in these industries, celebrities, politicians and high profile individuals are also likely targets of electronic eavesdropping. Any company, organization or individual with access to valuable or potentially damaging information could be a target of interest to an eavesdropper. Watch the below videos to learn more.


Question: Are there events or activities when eavesdroppers prefer to collect information? 

Answer: Eavesdroppers collect information that has value. The value can be monetary value, or it may be have national, political, personal or other value to the eavesdropper. The following are examples of events or activities that may be a particular interest to an eavesdropper:

  • Your company or organization is American-owned and operating in a foreign country.
  • The collection of Near Field Communications (NFC). The umbrella term for  wireless communications.
  • Business leadership, ownership and/or organizational structure changes are being discussed.
  • The business is about to be sold or a merger is underway.
  • Contract negotiations with major clients, unions or other labor organizations are in process.
  • A board of directors or stockholders meeting is about to occur.
  • The business, organization or individual is the subject of news media attention and/or a lawsuit.
  • New products or technologies are about to be patented or enter the market.
  • Marketing campaigns and/or sales strategies are being discussed.
  • Major changes in the number of employees or contractors are about to be made (expansions, layoffs, etc.).
  • A political campaign is about to be launched or a key election is about to occur.
  • A separation, divorce, child custody or other personal matter with important consequences is imminent.
  • Any event or activity is about to occur where valuable information is about to be discussed or exchange.

Question: What are the typical warning signs that you are a target of electronic eavesdropping?

Answer: Can you answer yes to one or more of these questions? If your answer is yes, then you may be a target of electronic eavesdropping:

  • Your private conversations have been repeated to you
  • Your competitors have access to otherwise properly guarded proprietary or confidential information
  • You have access to information that can be damaging or profitable to someone
  • Your competitors always seem to be one step ahead of you
  • You have been underbid on important contracts that you should have been a low price bidder
  • You are losing business to competitors who do not offer a better service, technology or experience

Question: What are common eavesdropping methods used to collect against targets?

Answer: Eavesdroppers have many choices of eavesdropping devices and methods to collect against targets. Modern technology has expanded both the range of collection of the devices and the length of time that a device has sufficient power to collect the information without the need to replace the power source. Devices can also push collected information over Wi-Fi networks, so retrieval of the eavesdropping device from the point of information collection is not necessary.

Eavesdropping devices range from inexpensive spy bugs that can be purchased on eBay for less than $20, to cellphone malware/spyware, to GPS trackers, to sophisticated methods used to capture data and boost it out over the cellular network. Typically, eavesdroppers will use several different types of collection devices to ensure they capture the needed information should a device be identified, be improperly positioned to gather the desired information or the power source fail. Skilled eavesdroppers may confuse the target by making on or two of the eavesdropping devices easy to locate, with the hope that the target will find one of these devices and stop searching for additional devices. Watch this video.


inter-e1413663822576Question: What does the term Cyber TSCM mean?

Answer: Cyber TSCM encompasses both traditional TSCM methods and cyber elements, such as those related to modern electronic devices (e.g. cellular phones, computers, etc.) and the software, malware and other threats posed by devices that operate within or interface with cyberspace.  COMSEC was the first privately owned counterespionage company to be published and identify the need for “CYBER TSCM” as a more accurate depiction of the best level of service to address todays emerging cyber and hybrid technical surveillance threats. Learn more about Cyber TSCM here.


israeli_bug_2-150x150Question: What types of eavesdropping devices does your TSCM / Cyber TSCM Survey Detect?

Answer: Below is a partial list of technical surveillance threats that ComSec LLC’s TSCM/Cyber TSCM surveys are designed to identify. 

  • Active (transmitting) and passive (devices that are turned off, or remote activated), bugging devices that transmit audio or video.
  • Laser and infrared eavesdropping devices
  • Wire and microphone taps
  • Wiretaps: Telephone & Telephone Line Analysis
  • Hidden Video cameras
  • Hidden cellular devices, GSM Bugs.
  • Carrier current devices
  • Mobile device malware / spyware
  • GPS tracking devices on vehicles
  • Acoustic compromises, etc, etc.

Question: How Much Does a Cyber TSCM Survey Cost?

Answer Cyber TSCM surveys are not inexpensive, but their value can be enormous. The most important question you can ask yourself is “what is the value of the information, IP or privacy” that you are aiming to protect? Then, it’s important to consider the technical savvy of suspected eavesdropper, the potential eavesdropping exposures and your budget. The more information you can share with COMSEC during your initial phone consultation, the better able we are to recommend a level of service that is appropriate for your particular situation. (Please see our “Hire ComSec, The Process” page for guidance before contacting us).

Cyber TSCM Service Options are usually dependent upon the square footage of the area, and the number of offices/rooms to be serviced, and the number of phones/lines, computers, audio/video equipment, mobile devices, etc. to be included with the survey. See examples below:

*Example: Cyber TSCM Survey of executive C-Suite offices, located in the Washington, DC Metro area: $3,895.00

*Example: TSCM Inspection of a Executive Residence townhouse located in the Washington DC, Metro area: $3,450.00

COMSEC has simplified this process by offering “Flat Fee” all inclusive Service Options:

Our Corporate Cyber TSCM Services Options page can be viewed here or download pdf.

Our Executive Residence Cyber TSCM Service Options can be viewed here or download pdf.

**One of these flat fee, all inclusive Cyber TSCM service options will cover 95% of most service requirements. Contact ComSec via our secure contact form or Call us at: +1-800-615-0392  and we will quote one of our all inclusive “Flat Fee” service options.

*ComSec Assurance Option.

**Daily rates and contract rates are available for contract and select assignments. In select cases, less comprehensive TSCM Inspections can be accomplished at a lower cost in some low threat situations only. The cost for these TSCM Inspections is determined on a case by case basis.


Question: How Long Does a Cyber TSCM Survey Take to Complete?

Answer: A Cyber TSCM Survey can take anywhere from a few hours to a few days to complete. The length of time is largely dependent on the size of the area to be serviced, number of phones/lines, etc., timely access to the areas to be surveyed, etc. Typically, most small Cyber TSCM surveys can be completed in one day.


Question: Why Should We Hire COMSEC?

IMG_1931

Answer: When you engage our services, you are hiring competent, well-trained counterintelligence experts who use the latest and greatest threat detection equipment and resources. We are aware of the current and emerging threats and ensure that we maintain capabilities to detect these threats.

IMG_1885 We are fully prepared and fully capable of handling all known threat levels, as well as the continuous technological advancements with regards to covert Technical Surveillance Devices (TSD), Technical Security Hazards (TSH), espionage methods, techniques, compromises and the more common non-electronic methods of compromise.

IMG_0550Your service is provided by an expert, not a technician or part-time service provider.  “You are hiring “Global Counterespionage Specialists” with a proven track record and real world-wide Counterespionage/Counterintelligence and Cyber Technical Surveillance Counter Measures experience.

ComSec’s teams have conducted successful CYBER TSCM operations and Counterespionage Advisory services throughout the United States and across the Globe. A ComSec service team and can usually be on-site within 24 hours. Contact us today.

420216_3572809645419_1529332825_n 

Global Counterespionage Specialists

Licensed, Insured and Certified TSCM Service Provider | USA Nationwide | Worldwide Services.

detect-insolate-secure-transparent