Cyber Counterespionage – Cyber Technical Surveillance Countermeasures – Cyber TSCM™
TSCM, proven and perfected.™
Securing Information and Cyber Risk Management in an increasingly data driven world is becoming difficult. The rise of smart phone technology, remote cloud data storage and the modern phenomenon of the BYOD culture add extra complexity to the problem of protecting confidential and proprietary information.
ComSec’s Counterespionage Specialists are “CYBER TSCM“ qualified professionals who possess the expertise and proper instrumentation to detect TSCM, Cyber TSCM and hybrid technical surveillance threats. COMSEC was the first privately owned counterespionage company to be published and identify the need for “CYBER TSCM” as a more accurate depiction of the best level of service to address today’s emerging cyber and hybrid technical surveillance threats.
What is the Difference Between TSCM and Cyber TSCM?
TSCM means Technical Surveillance Countermeasures that are used to detect electronic eavesdropping devices such as radio frequency bugs (think, listening device “bug” hidden under a desk), digital recorder or spy camera. Eavesdropping technology has evolved over the last decade in the respect that many of today’s eavesdropping threats originate from modern devices that may or may not have been developed for eavesdropping, but are capable of being exploited for eavesdropping purposes. Cyber TSCM™ encompasses both traditional TSCM methods and cyber elements, such as those related to modern electronic devices (e.g. cellular phones, computers, etc.) and the software, malware and other threats posed by devices that operate within or interface with cyberspace. ComSec LLC’s approach to eavesdropping detection addresses your potential eavesdropping exposures from electronic eavesdropping devices as well as the cyber eavesdropping elements.
Why Is Cyber TSCM such an Important Element of Your Cybersecurity Program?
The personnel with responsibility for maintaining your cybersecurity program are trained to detect network threats. They are not trained or equipped to detect eavesdropping devices that are used to exploit the cellular network or to detect hybrid devices. If your cybersecurity program does not include Cyber TSCM, you could be missing a very credible threat. Eavesdropping devices can be used to push data out over the cellular network and hybrid devices that appear to be harmless data cables can be used as eavesdropping devices. The results of these eavesdropping attacks can have devastating effects on your company just as much as an IT related cybersecurity issue.
ComSec’s Cyber TSCM Inspection is used to detect electronic eavesdropping devices and/or technical intrusions via remote access attack. Those conducted via GSM, 3G & 4G within your company that is used for remote cellular access and collection of your confidential information. These attacks enable cyber intruders to gain unauthorized access from anywhere in the world via a mobile phone signal. ComSec has an advanced suite of Cyber Counterespionage – Cyber TSCM services designed to detect anomalies associated with GSM, 3G & 4G and Advanced Persistent Threats (APT) attacks.
What are Hybrid Devices?
Hybrid devices are devices that are commonly found in offices or homes which have been repurposed as eavesdropping devices. So, while the device would not be suspect because of its appearance and/or location, it is actually a very credible threat that can only be detected through use of Cyber TSCM methods.
Hybrid Threat Example: A CAT 5 cable (just like this one) plugged into the back of your phone or computer with a embedded “fiberoptic microphone” plugged into an access port or phone, etc. in your office, conference room or home. This cyber eavesdropping threat can pick up a whisper from across a room. The intel gained from this type of device may be listened to via real time, via digital recording device, or boosted out over the cellular, wi-fi or bluetooth network. How long do you think it would take to install this eavesdropping device which simply needs to be “plugged” in? This is a very serious eavesdropping threat that could stay in place, undetected for YEARS if you do not perform routine Cyber TSCM surveys.
ComSec Cyber Technical Surveillance Counter Measures (Cyber TSCM) inspections are globally unique in that we have unique equipment and processes, which are not available through any other provider. ComSec is thereby able to provide clients with preeminent Cyber TSCM Counter Measures to detect active & passive internal and external threats and protect valuable intellectual property, trade secrets, and proprietary data, financial and other electronically stored private information. Additionally provided are protection against advanced persistent threats (APT) and numerous malware variants, and the providing of pre-attack intelligence against industrial espionage and “hacktivist” assault.
Our Cyber TSCM Inspection identifies exploitable pathways and system entry points that are vulnerable to unauthorized remote system access. ComSec’s unique radio frequency spectrum analysis will also provide a professional evaluation of your business executive offices or facility’s security posture against electronic eavesdropping and GSM / 3G / 4G and CDMA remote cellular attacks. The Cyber TSCM Inspection will consist of thorough electronic and physical examinations to detect unauthorized audio, cellular and optical devices (Technical Surveillance Device). For example, wireless transmitters (bugs), Wire & mic tap, telephone compromise tap, carrier current bug, micro wireless video device, laser and infrared eavesdropping device, etc.
Don’t trust your valuable IP to an antiquated cyber risk management program… Contact ComSec