Essentials of a Proactive TSCM Strategy – Part 2 of 7

Managing the Evolving Threat of Industrial Espionage and Electronic Eavesdropping. Proper implementation of a Technical Surveillance Counter Measures Program

This article is part 2 of a 7-part series.

Outline of Article

 

Conducting Regular Electronic Bug Sweeps

Regular bug sweeps are essential to detect and remove any unauthorised surveillance devices. These sweeps should be conducted by trained professionals using specialised equipment. They should also be conducted on a regular basis to ensure that any new devices are detected quickly.

Bug sweeps can be conducted in a variety of settings, including offices, homes, and vehicles. By conducting regular bug sweeps, you can ensure that your private conversations and sensitive information remain private.

Protecting Executive Offices

Executive offices often contain sensitive information. Conducting a thorough TSCM Inspection of your offices regularly ensures your trade secrets, intellectual property, business strategy, client information, etc. remain safe from the threat of corporate espionage.

It’s important to secure these areas with strong physical and digital security
measures. This can include installing secure doors and windows, using secure
communication lines, and restricting access to these areas.

In addition to physical security measures, it’s also important to implement digital security measures. This can include using encrypted communication channels, installing security software on all devices, and regularly updating all software and hardware. By implementing these measures, you can help ensure that sensitive information remains confidential.

Back to Overview

Fortifying the Executive Home Office

As an increasing number of employees opt for private residences as their primary work locations, many leading organizations enlist NSI Global to proactively conduct Technical Surveillance Countermeasures (TSCM) investigations at the residences of executives working from home.

Whether you are a director, employee, or a department head who has identified a potential threat to your organisation’s intellectual property, contact us to ensure the security of your home office.

Securing your home office is crucial for maintaining the confidentiality and integrity of your work. Here are some security recommendations for a work-from-home office:

  • Secure Wi-Fi Network: Set up a strong, unique password for your home Wi-Fi
    network. Use WPA3 encryption if available for a more secure connection.
  • VPN (Virtual Private Network): Use a VPN to encrypt your internet connection,
    ensuring a secure communication channel between your home office and your
    organisation’s network.
  • Firewall Protection: Enable the firewall on your home router and computer to
    prevent unauthorized access.
  • Device Security: Keep all devices, including computers, routers, and IoT devices,
    updated with the latest security patches. Use strong passwords or passphrases for
    all devices.
  • Antivirus Software: Install reputable antivirus and anti-malware software to protect
    against malicious software.
  • Secure Communication: Use secure communication tools and platforms approved
    by your organization. Avoid using public Wi-Fi networks for sensitive work-related
    communications.
  • Data Backup: Regularly back up your work-related data to an external hard drive or
    a secure cloud service.
  • Physical Security: Lock your home office when not in use to prevent unauthorised access. Securely store physical documents containing sensitive information.
  • Video Conferencing Security: Set up passwords for virtual meetings to prevent
    unauthorized access. Be mindful of your surroundings during video calls to avoid
    unintentional exposure to sensitive information.
  • Regular Software Updates: Keep your operating system, applications, and security
    software up to date with the latest patches and updates.
  • Cohabitants: Educate other household members about the importance of security
    measures.
  • Multi-Factor Authentication (MFA): Enable MFA whenever possible to add an extra layer of security to your accounts.
  • Secure Document Handling: Store all sensitive documents in a lockable cabinet.
    Shred physical documents that are no longer needed. Encrypt sensitive electronic
    documents before transferring or storing them.
  • Work Time Management: Establish clear boundaries between work and personal
    time to minimise security risks during non-working hours.
  • Regular TSCM Security Audits: Regularly conduct TSCM Sweeps to review and
    assess your home office security setup in order to identify and address any potential
    vulnerabilities and locate any newly hidden devices.

By implementing these and other more comprehensive security recommendations,
NSI Global can help you create a more resilient and secure work-from-home
environment.

Back to Overview

Securing Meeting Spaces, Conference Rooms and Boardrooms

Conference rooms, meeting spaces, and boardrooms are often targeted by eavesdroppers. These spaces should be secured with soundproofing, secure communication lines, and regular security sweeps. It’s also important to restrict access to these spaces and to ensure that all attendees are authorized to be there.

In addition to these measures, it’s also important to educate employees about the risks associated with these spaces such as the use of any devices including but certainly not limited to desk phones, keyboards, or tablets that have not been tested and cleared to be free from piggyback devices like keyloggers, pinhole cameras and microphones, or infection by spyware. By taking these steps, you can help ensure that your meetings remain private and secure.

Back to Overview

Sensitive Compartmented Information Facilities

For organisations necessitating heightened security protocols for confidential information and discussions, NSI Global offers guidance on establishing a Secure Compartmented Information Facility (SCIF). A SCIF is an enclosed, windowless, and secure space within a building designed for the storage, processing, or discussion of sensitive compartmented information, tailored to the operational needs of the organisation.

While government departments commonly utilize SCIFs, larger private organisations seeking to safeguard sensitive information also find them essential. SCIFs can be either permanent or temporary, and they may be mobile, housed within large vehicles, ships, aircraft, or deployed in the field.

Key characteristics of a SCIF include its status as a secure room or suite of rooms within a facility constructed to elevated security standards, providing physical protection and defense against electronic surveillance from external sources. Unauthorized access is strictly prohibited, and individuals without proper clearance must surrender all electronic devices before entering the SCIF.

Access to the SCIF location is controlled, incorporating alarms, CCTV coverage, secure storage containers, privacy measures against external observation, and routine inspections to ensure the facility is free from bugs or other security risks. Some SCIFs lack electrical cabling, while others monitor all electronic services. Additionally, certain SCIFs are organized with layered security, placing services in the outer ring and restricting them within the SCIF room.

Back to Overview

Addressing Vehicle Surveillance

Vehicles can also be a target for surveillance. Consider implementing security measures like regular TSCM vehicle inspections. These measures can help detect and prevent unauthorized surveillance.

It is important to educate drivers about the risks associated with vehicle surveillance. NSI Global’s TSCM Inspectors are well-versed in detecting even the most sophisticated covert devices in all vehicles and other forms of luxury transport.

Additionally, we can detect devices that may be hidden around, or masked by, transmissions of the systems and equipment contained within aircraft and yachts including:

Private Jets

  • Instrument Landing Systems (ILS)
  • Ground Based Augmentation Systems (GBAS)
  • Terminal Area Radars (TAR)
  • Automatic Dependent Surveillance Broadcast System (ADS-BS)
  • Advanced Surface Movement Guidance and Control Systems (A-SMGCS)

Yachts

  • Long Range Open Array Radars
  • Wireless CHIRP Radars
  • Doppler Collision Avoidance Systems
  • Weather Systems Radars
  • Radome Systems
  • Automatic Identification System

Today’s executives are consistently on the move and there is a need to be constantly connected. Multi-million dollar, and sometimes Multi-Billion dollar decisions cannot wait until you are back in your bug-swept boardroom. Discussions that can make or break a business are now routinely held in Cars, Yachts, and Private Jets. If a competitor can harm you, or profit from tracking you and recording your meetings, your mobile office will be an undeniably attractive target.

Click To Read Part 3.

If you have any questions about this article or would like to enquire about our range of other services, please call 1300 000 NSI (674).

Subscribe!

This field is for validation purposes and should be left unchanged.

Secure your peace of mind