Technical Surveillance Counter-Measures
Encyclopedia
TSCM is the original United States Federal government abbreviation
Abbreviation
An abbreviation is a shortened form of a word or phrase. Usually, but not always, it consists of a letter or group of letters taken from the word or phrase...

 denoting the process of bug
Covert listening device
A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, is a common technique in surveillance, espionage and in police investigations.A bug does not have to be a device...

-sweeping or electronic countersurveillance
Countersurveillance
Countersurveillance refers to measures undertaken to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as bug sweeping, the process of detecting surveillance devices, including covert listening devices and visual surveillance devices...

. It is related to ELINT, SIGINT
SIGINT
Signals intelligence is intelligence-gathering by interception of signals, whether between people , whether involving electronic signals not directly used in communication , or combinations of the two...

 and electronic countermeasures
Electronic countermeasures
An electronic countermeasure is an electrical or electronic device designed to trick or deceive radar, sonar or other detection systems, like infrared or lasers. It may be used both offensively and defensively to deny targeting information to an enemy...

 (ECM).

The United States Department of Defense
United States Department of Defense
The United States Department of Defense is the U.S...

 defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance
Surveillance
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...

 devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility.

This definition is however lacking some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.

Radio frequencies

Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively.

Devices that do not emit radio waves

Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs.

Very sensitive equipment could be used to look for magnetic field
Magnetic field
A magnetic field is a mathematical description of the magnetic influence of electric currents and magnetic materials. The magnetic field at any given point is specified by both a direction and a magnitude ; as such it is a vector field.Technically, a magnetic field is a pseudo vector;...

s, or for the characteristic electrical noise emitted by the computerized technology in digital tape recorders; however, if the place being monitored has many computer
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...

s, photocopier
Photocopier
A photocopier is a machine that makes paper copies of documents and other visual images quickly and cheaply. Most current photocopiers use a technology called xerography, a dry process using heat...

s, or other pieces of electrical equipment
Electrical equipment
Electrical equipment includes any machine powered by electricity. They usually consists of an enclosure, a variety of electrical components, and often a power switch...

 installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search.

Another method is using very sensitive thermal cameras to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera.

Technology used

Technology most commonly used for a bug sweep includes but is not limited to:
  • Multimeter
    Multimeter
    A multimeter or a multitester, also known as a VOM , is an electronic measuring instrument that combines several measurement functions in one unit. A typical multimeter may include features such as the ability to measure voltage, current and resistance...

    s for general measurements of power supplies and device components
  • Time-domain reflectometer
    Time-domain reflectometer
    A time-domain reflectometer is an electronic instrument used to characterize and locate faults in metallic cables . It can also be used to locate discontinuities in a connector, printed circuit board, or any other electrical path...

     (TDR) for testing the integrity of copper telephone lines and other communication cables
  • Frequency scanner
    Scanner (radio)
    A scanner is a radio receiver that can automatically tune, or scan, two or more discrete frequencies, stopping when it finds a signal on one of them and then continuing to scan other frequencies when the initial transmission ceases....

     with a range of antenna
    Antenna (radio)
    An antenna is an electrical device which converts electric currents into radio waves, and vice versa. It is usually used with a radio transmitter or radio receiver...

    s and filter
    Electronic filter
    Electronic filters are electronic circuits which perform signal processing functions, specifically to remove unwanted frequency components from the signal, to enhance wanted ones, or both...

    s for checking the electromagnetic spectrum
    Electromagnetic spectrum
    The electromagnetic spectrum is the range of all possible frequencies of electromagnetic radiation. The "electromagnetic spectrum" of an object is the characteristic distribution of electromagnetic radiation emitted or absorbed by that particular object....

     for signals that should not be there
  • Oscilloscope
    Oscilloscope
    An oscilloscope is a type of electronic test instrument that allows observation of constantly varying signal voltages, usually as a two-dimensional graph of one or more electrical potential differences using the vertical or 'Y' axis, plotted as a function of time,...

     for visualisation of signals
  • Spectrum analyzer
    Spectrum analyzer
    A spectrum analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. The primary use is to measure the power of the spectrum of known and unknown signals...

     and vector signal analyzer
    Vector signal analyzer
    A vector signal analyzer is an instrument that measures the magnitude and phase of the input signal at a single frequency within the IF bandwidth of the instrument...

     for more advanced analysis of threatening and non threatening rf signals
  • Nonlinear junction detector
    Nonlinear junction detector
    The non-linear junction detector, or an NLJD, is a device that illuminates a small region of space with high-frequency, RF energy. Any "non linear junction" in the vicinity—for example, and particularly, the p-n junction -- will receive this energy, and because of the non-linear nature of the...

     (NLJD) for detection of components associated with hidden eavesdropping devices.
  • Portable x-ray
    X-ray
    X-radiation is a form of electromagnetic radiation. X-rays have a wavelength in the range of 0.01 to 10 nanometers, corresponding to frequencies in the range 30 petahertz to 30 exahertz and energies in the range 120 eV to 120 keV. They are shorter in wavelength than UV rays and longer than gamma...

     machine for checking the inside of objects and walls.
  • Computer security
    Computer security
    Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

     devices and tools for computer-related threats
  • Tool
    Tool
    A tool is a device that can be used to produce an item or achieve a task, but that is not consumed in the process. Informally the word is also used to describe a procedure or process with a specific purpose. Tools that are used in particular fields or activities may have different designations such...

    s for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check.
  • Thermal imaging
    Thermography
    Infrared thermography, thermal imaging, and thermal video are examples of infrared imaging science. Thermal imaging cameras detect radiation in the infrared range of the electromagnetic spectrum and produce images of that radiation, called thermograms...

     helps find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components.
  • Flashlight
    Flashlight
    A flashlight is a hand-held electric-powered light source. Usually the light source is a small incandescent lightbulb or light-emitting diode...

     one of the most important tools to have beside a ladder for providing a competent sweep.

See also

  • Telephone tapping
    Telephone tapping
    Telephone tapping is the monitoring of telephone and Internet conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line...

  • Covert listening device
    Covert listening device
    A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, is a common technique in surveillance, espionage and in police investigations.A bug does not have to be a device...

  • Espionage
    Espionage
    Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

  • Privacy
    Privacy
    Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...

  • Military intelligence
    Military intelligence
    Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions....

  • Communications security
    Communications security
    Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the United States Department of Defense culture, it is often referred to by the abbreviation...

  • Secure telephone
    Secure telephone
    A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack...

  • Security engineering
    Security engineering
    Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts...


External links

  • ATSCP – a non-profit association representing professionals in the European TSCM industry
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK