Managing the Evolving Threat of Industrial Espionage and Electronic Eavesdropping. Proper implementation of a Technical Surveillance Counter Measures Program
This article is part 2 of a 7-part series.
- Essentials of a Proactive TSCM Strategy
Conducting Regular Electronic Bug Sweeps
Regular bug sweeps are essential to detect and remove any unauthorised surveillance devices. These sweeps should be conducted by trained professionals using specialised equipment. They should also be conducted on a regular basis to ensure that any new devices are detected quickly.
Bug sweeps can be conducted in a variety of settings, including offices, homes, and vehicles. By conducting regular bug sweeps, you can ensure that your private conversations and sensitive information remain private.
Protecting Executive Offices
Executive offices often contain sensitive information. Conducting a thorough TSCM Inspection of your offices regularly ensures your trade secrets, intellectual property, business strategy, client information, etc. remain safe from the threat of corporate espionage.
It’s important to secure these areas with strong physical and digital security
measures. This can include installing secure doors and windows, using secure
communication lines, and restricting access to these areas.
In addition to physical security measures, it’s also important to implement digital security measures. This can include using encrypted communication channels, installing security software on all devices, and regularly updating all software and hardware. By implementing these measures, you can help ensure that sensitive information remains confidential.
Fortifying the Executive Home Office
As an increasing number of employees opt for private residences as their primary work locations, many leading organizations enlist NSI Global to proactively conduct Technical Surveillance Countermeasures (TSCM) investigations at the residences of executives working from home.
Whether you are a director, employee, or a department head who has identified a potential threat to your organisation’s intellectual property, contact us to ensure the security of your home office.
Securing your home office is crucial for maintaining the confidentiality and integrity of your work. Here are some security recommendations for a work-from-home office:
- Secure Wi-Fi Network: Set up a strong, unique password for your home Wi-Fi
network. Use WPA3 encryption if available for a more secure connection. - VPN (Virtual Private Network): Use a VPN to encrypt your internet connection,
ensuring a secure communication channel between your home office and your
organisation’s network. - Firewall Protection: Enable the firewall on your home router and computer to
prevent unauthorized access. - Device Security: Keep all devices, including computers, routers, and IoT devices,
updated with the latest security patches. Use strong passwords or passphrases for
all devices. - Antivirus Software: Install reputable antivirus and anti-malware software to protect
against malicious software. - Secure Communication: Use secure communication tools and platforms approved
by your organization. Avoid using public Wi-Fi networks for sensitive work-related
communications. - Data Backup: Regularly back up your work-related data to an external hard drive or
a secure cloud service. - Physical Security: Lock your home office when not in use to prevent unauthorised access. Securely store physical documents containing sensitive information.
- Video Conferencing Security: Set up passwords for virtual meetings to prevent
unauthorized access. Be mindful of your surroundings during video calls to avoid
unintentional exposure to sensitive information. - Regular Software Updates: Keep your operating system, applications, and security
software up to date with the latest patches and updates. - Cohabitants: Educate other household members about the importance of security
measures. - Multi-Factor Authentication (MFA): Enable MFA whenever possible to add an extra layer of security to your accounts.
- Secure Document Handling: Store all sensitive documents in a lockable cabinet.
Shred physical documents that are no longer needed. Encrypt sensitive electronic
documents before transferring or storing them. - Work Time Management: Establish clear boundaries between work and personal
time to minimise security risks during non-working hours. - Regular TSCM Security Audits: Regularly conduct TSCM Sweeps to review and
assess your home office security setup in order to identify and address any potential
vulnerabilities and locate any newly hidden devices.
By implementing these and other more comprehensive security recommendations,
NSI Global can help you create a more resilient and secure work-from-home
environment.
Securing Meeting Spaces, Conference Rooms and Boardrooms
Conference rooms, meeting spaces, and boardrooms are often targeted by eavesdroppers. These spaces should be secured with soundproofing, secure communication lines, and regular security sweeps. It’s also important to restrict access to these spaces and to ensure that all attendees are authorized to be there.
In addition to these measures, it’s also important to educate employees about the risks associated with these spaces such as the use of any devices including but certainly not limited to desk phones, keyboards, or tablets that have not been tested and cleared to be free from piggyback devices like keyloggers, pinhole cameras and microphones, or infection by spyware. By taking these steps, you can help ensure that your meetings remain private and secure.
Sensitive Compartmented Information Facilities
For organisations necessitating heightened security protocols for confidential information and discussions, NSI Global offers guidance on establishing a Secure Compartmented Information Facility (SCIF). A SCIF is an enclosed, windowless, and secure space within a building designed for the storage, processing, or discussion of sensitive compartmented information, tailored to the operational needs of the organisation.
While government departments commonly utilize SCIFs, larger private organisations seeking to safeguard sensitive information also find them essential. SCIFs can be either permanent or temporary, and they may be mobile, housed within large vehicles, ships, aircraft, or deployed in the field.
Key characteristics of a SCIF include its status as a secure room or suite of rooms within a facility constructed to elevated security standards, providing physical protection and defense against electronic surveillance from external sources. Unauthorized access is strictly prohibited, and individuals without proper clearance must surrender all electronic devices before entering the SCIF.
Access to the SCIF location is controlled, incorporating alarms, CCTV coverage, secure storage containers, privacy measures against external observation, and routine inspections to ensure the facility is free from bugs or other security risks. Some SCIFs lack electrical cabling, while others monitor all electronic services. Additionally, certain SCIFs are organized with layered security, placing services in the outer ring and restricting them within the SCIF room.
Addressing Vehicle Surveillance
Vehicles can also be a target for surveillance. Consider implementing security measures like regular TSCM vehicle inspections. These measures can help detect and prevent unauthorized surveillance.
It is important to educate drivers about the risks associated with vehicle surveillance. NSI Global’s TSCM Inspectors are well-versed in detecting even the most sophisticated covert devices in all vehicles and other forms of luxury transport.
Additionally, we can detect devices that may be hidden around, or masked by, transmissions of the systems and equipment contained within aircraft and yachts including:
Private Jets
- Instrument Landing Systems (ILS)
- Ground Based Augmentation Systems (GBAS)
- Terminal Area Radars (TAR)
- Automatic Dependent Surveillance Broadcast System (ADS-BS)
- Advanced Surface Movement Guidance and Control Systems (A-SMGCS)
Yachts
- Long Range Open Array Radars
- Wireless CHIRP Radars
- Doppler Collision Avoidance Systems
- Weather Systems Radars
- Radome Systems
- Automatic Identification System
Today’s executives are consistently on the move and there is a need to be constantly connected. Multi-million dollar, and sometimes Multi-Billion dollar decisions cannot wait until you are back in your bug-swept boardroom. Discussions that can make or break a business are now routinely held in Cars, Yachts, and Private Jets. If a competitor can harm you, or profit from tracking you and recording your meetings, your mobile office will be an undeniably attractive target.