New TSCM Annexure A
New TSCM Annexure A
New TSCM Annexure A
PRACTICAL OVERVIEW OF
EQUIPMENT AND PROCEDURES
TECHNICAL SURVEILLANCE
COUNTERMEASURES (TSCM)
“DEBUGGING”
INTRODUCTION
For many businesses, intellectual property protects more than just an idea or a concept – it protects genuine
business assets that may be integral to the core services of the business and overall long-term viability.
Intellectual property can consist of many different areas, from logos and corporate identity through to
products, services and processes that differentiate your business offering. It’s when these ideas are used
without permission that an organisation can suffer. Almost all businesses have undoubtedly benefited from
the internet, where products, services and marketing communications can reach vast audiences at relatively
low costs - but this has also increased the chances of intellectual property theft. Companies of all sizes are at
risk of having their unique ideas, products or services infringed upon, even if they are on the other side of
the world, making intellectual property protection more important than ever.
A main contributing factor in corporate espionage and the use of listening and video devices is the increasing
sophistication, durability, and ready availability of items on the market. In South Africa, bugging devices can
be readily bought over the counter and through popular online retailers, and the devices are smaller and
capable of being on for longer periods to capture information. This is making the corporate spy’s job even
easier.
The threat of corporate espionage is real. Advanced Corporate Solutions (ACS) provides all-encompassing
and comprehensive Technical Surveillance Countermeasures (TSCM) Investigations. The most modern and
technologically advanced equipment, available in South Africa, are used during our TSCM Investigations.
TSCM PROGRAMME
Herewith more information about the TSCM Programme and the necessity of Protecting Company
Intellectual Property (IP) – Communication Security.
TABLE OF CONTENTS
TSCM EQUIPMENT
We make use of state-of-the-art equipment, purposely built to perform specific tasks during our
assessments. Our equipment register consists of the following:
OSCOR™
BLUE SPECTRUM ANALYSER
BLOODHOUND SHEARWATER
2000
(To test for hidden and live microphones on telephones and lines, please
visit www.shearwatertscm.com)
The Seek ShotPRO is the most advanced thermal imaging camera for
professionals. Photos and videos are analysed immediately with new
on-board thermography tools. Spot measurements and temperature
boxes are created for time-saving reports. Problems are precisely
diagnosed with 16x higher resolution.
The first of its kind, the Cat® S60/ Flir One gives live
thermal imaging expertise direct from a smartphone. This
rugged device uses FLIR (Forward Looking Infrared) to
capture shareable clear thermal imagery, video, and even
time-lapse footage. The thermal imaging technology is
used in the field of Technical Surveillance Measures
Investigations (TSCM) to determine if there are any hidden
electronic devices in a specific area. Electronic devices
have multiple methods of accessing power to function and
this invariably leads to the emission of heat. The device
can further be used to identify and locate rogue Wi-Fi
access points in a target area.
Mobile devices, which include smart phones and tablet computers, provide increased functionality and
ease of use to people, anywhere and anytime.
Smart phones are the new computers. These devices contain a tremendous amount of personal and even
business information. With rapidly increasing advances in technology, everyday life is starting to depend on
these wireless technologies, but it brings greater risk and some unique security threats.
Mobile device malware (malicious code) has increased exponentially over the past few years. The
sophistication of these exploits has also increased exponentially, making detection and eradication very
difficult. Anyone can install eavesdropping software on your smart phone, as long as they have access to your
phone even for a few minutes. This can result in them gaining access to all your private data such as SMS,
emails, pictures, location information, call logs and even listen in on actual calls.
Some malicious code will even allow the attacker to switch on the microphone of the device unnoticed and
listen in on conversations or use the camera to secretly take pictures. Cellebrite is a world leader in the
development of advance mobile forensic hardware and software products. The Universal Forensic Extraction
Device (UFED) Touch Ultimate from Cellebrite is an example of hardware used by mobile device investigators
to gather information from mobile devices that may contain infected and malicious data.
In the face of the COVID-19 pandemic, most companies adopted a "working from home" policy. This had an
adverse effect on companies, changing the way we work and operate, and introducing new Information
Security Risks. During these trying times, perpetrators have made it clear that they are not resting, and they
are not backing down! In fact, we have seen a substantial increase in these types of attacks over the last
couple of months.
With "working from home" policies becoming the new norm, it now poses significant security risks, mainly
due to companies and ICT teams having to rush, to put in place applications and services that enable remote
work as well as more insecure connections.
In a recent survey conducted across 300 remote office workers and 300 ICT professionals, the results showed
that 57% of remote workers use communication tools such as Zoom and Microsoft Teams, which have had
well-publicised security problems in recent months.
Risky cyber-practices were shown to be particularly prevalent amongst working parents included in the study,
who face additional distractions such as childcare and home-schooling. Of this cohort, 57% insecurely save
passwords in browsers on their corporate devices while 89% said they reuse passwords across applications
and devices. Additionally, 21% allow other members of their household to use their corporate devices for
activities like schoolwork, gaming, and shopping. Despite the additional security risks posed by the huge rise
in remote working, 57% of ICT professionals surveyed said they have not increased their security protocols
in this period.
It is a well-known fact that home networks, and more specifically home Wi-Fi networks are far less secure
than corporate networks, which poses another significant risk to business. In many cases, once a Wireless
router has been installed, we find a place in our home for it and forget about it. If all our devices are set up
and connected via the Wi-Fi network, that is all that matters, right? Wrong!
Probably many of you do not realise it, but the Internet router is one of the most important devices in our
home. It is the gateway to our Internet access and prone to exploits by cybercriminals who can sneak into
our devices and get access to our system. Let us not forget that we live in the age of data breaches,
ransomware attacks, and many other online threats. Thus, one should be worried about the security of our
home network and take all the needed security measures to increase Wi-Fi security.
Dynamdre, in conjunction with Advanced Corporate Solutions (ACS), conducts formal Wi-Fi Security
Assessment within the residential (home) environments, registered to and owned by executive management
from numerous organisations. The Dynamdre Wi-Fi Security Assessment provides organisation’s executives
with insight into the resilience of their home information security posture to withstand attack from
unauthorised users, and the potential for valid users to abuse their privileges and access.
Technical Controls and Security Assessment focus areas include, but are not limited to the following:
COMMITMENT:
• Advanced Corporate Solutions undertakes to allow the client to have all our equipment checked
prior to and after the investigation, to ensure that no eavesdropping devices are taken onto the
client’s property by our investigators.
Should any eavesdropping equipment be found, the steps listed below will be followed:
EQUIPMENT:
CLIENTS OUTSIDE SOUTH AFRICA
• Due to the fact that TSCM equipment may be seen as espionage equipment by the Government, an
authorisation letter from the Embassy for the entry of our Contractors with the necessary equipment
will be required.
• A representative from Government should be requested to meet ACS Contractors at the airport to
assist with Customs and clearance of equipment.
COMMUNICATIONS SECURITY
INTRODUCTION – THE TSCM PROGRAMME
Due to the advancement of Global Corporate Competitiveness, there is a growing need amongst Corporate
Institutions especially at Executive Staff levels to protect all forms of communications. Communications
Security encompasses all aspects of Communications transmission - Oral (spoken), Written and Data
transmission, together with all relevant security techniques intended to achieve maximum possible
protection of such transmission. It is of interest to note that more than 90% of the top listed Corporates in
South Africa conduct a regular programme of TSCM. This proposal, however, is confined to the Oral
(spoken) method of transmission and the existing current TSCM implemented to achieve maximum
possible protection and security of such transmissions. It should always be remembered that information is
a Corporate Asset and management, and staff have a responsibility to protect it.
COMMUNICATIONS SECURITY
GENERAL
Corporate Intelligence has over recent years, become critical to the overall protection of Corporate Assets,
Property, Products, Personnel and ultimately Development. Corporate Intelligence is the acquisition of
relevant information, the collation, analysis and ultimately the evaluation of such information, aimed at
identifying and thus protecting the Corporate from vulnerability to threat. It can also be used as a tool
against a company.
• The levels of Threat range from petty theft, Product Extortion and Fraud to Economic Espionage.
• Obviously, Communication Security is most essential in the avoidance of Corporate Espionage and
thus an essential element of Corporate Intelligence.
• Corporate Intelligence implemented professionally and correctly has been found to be a most
effective pro-active measure in countering the offensive activities aimed detrimentally against a
Corporate and as such, must be considered essential in the overall security, policy and programme
designed and implemented by that Corporate.
COMMUNICATIONS SECURITY
INFORMATION GATHERING
The following are prime sources of information gathering:
PHYSICAL SOURCE
The human being, Management, Staff and often Associates - such sources transmit information either
intentionally, frequently for personal gain or revenge, or unintentionally “careless talk”. Irrespective, every
effort should be taken to employ “the Need to Know” practices.
NON-PHYSICAL SOURCE
• Communication Interception.
• Documents (Non-Oral).
• Data/Information Technology (Non-Oral).
THREAT:
Economic Espionage invariably incurs financial consequence. If successful, its high levels of sophistication,
both nationally and internationally frequently incurs considerable consequences to not only corporate
survival, but also Global and National economies. Regrettably, modern technological advances continually
increase the sophistication of such espionage consequently requiring considerable advancement in Security
Technology, Techniques and Training, Awareness and Implementation, thus an ever-greater need for the
highest levels of Corporate Intelligence and Pro-active Security Responses.
RISK ANALYSIS:
Risk analysis is the application of techniques employed to identify risks and the potential effect of such risk
to the Personnel and Organisation being protected.
THREAT ASSESSMENT:
Threat assessment is the determination of the imminence and level of such threat to either personnel or
elements of the organisation. In the event of such threats, as detailed previously, a Corporate requires
formulated policies and contingency plans to guide the protective response of the Corporate.
The overall protective strategy of the Corporate is a basic Security Policy Decision achieved by Standing
Operational Procedures (SOPs) designed and implemented to attain maximum possible security for the
Corporate, in any given environment, thus achieving the Secure by Policy. Such SOPs are implemented
within the framework of the appropriate Corporate’s policy.
In undertaking a Threat Assessment, it is accepted that the following are generally examined:
• Listed Companies
• Financial Institutions
• Legal Practices
• The Mining Industry
• The Pharmaceutical Industry
• Tender Boards/Committees
AIM: “WHY?”
• Intellectual Value
• Acquisitions and Merges
• Share Values
• Strategic Planning for Business or Competitive Information
• Conflict of Interest amongst Directors and Senior Management/Personnel
• Recruitment (Head hunting) of Specialist or highly knowledgeable Personnel
External
• The Residences of Directors, Executive Management and identified Personnel employed on highly
sensitive tasks.
• Selected Offices and Locations of persons closely associated with Contracts, Acquisitions, Legal and
Financial Information/Activities, contracted to conduct business on behalf of the Corporate.
COMMUNICATIONS SECURITY
PROTECTION
i. the Microphone,
ii. Wire and
iii. Line Drive Amplifier.
The Microphone is normally installed in a non-conspicuous place in the room and is supplied with power by
the eavesdropper, via the same wire that carries the Microphone Audio to the eavesdropper. One does not
always have to install a Microphone, as use can be made of items in the room, e.g. the Telephone
Microphone, Intercom Systems, Television System and Radio Speakers can be adapted.
Radio Transmitters:
A Transmitter is one of the most versatile and flexible means of gathering information and comes in various
shapes and sizes. The ideal type of Transmitter is one as small as possible, having a small signal (low watts),
so that it is difficult to detect. Requiring the smallest of power sources and using the highest frequency
possible, enables the use of a shorter antenna (i.e. VHF – UHF).
COMMUNICATIONS SECURITY
TELEPHONE ANALYSING
Many people are under the impression that it is only their telephone calls that can be monitored, not
knowing that what they say after the telephone is “hung up”, may also be overheard via the same
Telephone Instrument. This is possible by using any one of the Microphones in the Telephone. Whatever
ones needs, Telephone Transmitters provide the ability to discreetly and automatically transmit all
telephone conversations. These are easily installed either on the Telephone Wire, in the Telephone Socket
or within the Instrument itself. Telephone users will have absolutely no indication of their presence.
• The transmitter signal varies in relation to and is analogous (similar) to the original signal.
• With an Amplifier or a Telephone Instrument a person can listen to the audio on the line.
• With a voice logger installed, Digital Telephones can be tapped on a limited basis.
• The voice logger must be operated by one person with a security clearance. The room must be
locked with a security lock and proper access control measures in place.
Telephone Threat:
• The Telephone Transmitter is in the Telephone or Online and uses Telephone Power.
• Audio Transmitter in Telephone or room, Self-Powered.
• Telephone Notification.
• Hidden Microphone in Telephone or Online in the Office.
• Room and Telephone Listening Device in Telephone or Online in the Office.
• Telephone Tap Online.
COMMUNICATIONS SECURITY
PROTECTION OF COMMUNICATION:
COUNTER ELECTRONIC PROCEDURES
In conducting a Counter Measures Programme the following services are implemented:
• A comprehensive Threat Assessment will be made for all designated target areas and a plan
developed to best implement the TSCM.
• A full Radio Frequency Spectrum Analysis will be performed to check for hidden Room
Transmitters and Telephone connected Transmitters.
• Electrical Power Lines and other Lines will be inspected with specialised equipment in order to
locate Line “Carrier Current Device”, “VLF Transmitters”.
• A complete Electronic Analysis and Physical Inspection will be accomplished on all target area
Telephones, Incoming Telephones and Incoming Telephone Lines.
• Testing for Active and Passive Devices in respect of Telephones and Intercommunication Systems
and Equipment.
COMMUNICATIONS SECURITY
• Overall Facilities Sweep: Conducted Twice Yearly via a full Physical Sweep of all Offices and
Facilities and to include Marking/De-marking of Wire Cables.
• To assist in the identification of Offices and Locations considered to be most vulnerable i.e.
Directors’ Offices, Executive Management Offices, Specialist Personnel Offices, Boardrooms, PA
Offices etc., these should be identified and given a Threat Rating Identification e.g. “Threat Level
3”.
• Such Offices and Locations undergo a Weekly Silent Sweep and on a Monthly Basis an Overall
Facilities Full Physical Sweep.
COMMUNICATIONS SECURITY
Operational implementation
TSCM can be implemented in two ways:
In-house:
Extensive in-depth research and investigation has determined that in-house implementation is
considered not advisable due to:
• Additional training of personnel to keep up to date with frequently upgraded or new equipment,
together with regular continuation training required to achieve and maintain operational efficiency.
• The need to have existing equipment re-calibrated at least annually to maintain operational
efficiency. Currently this can only be obtained by returning the equipment to the manufacturers.
As yet, this service is not available in South Africa.
• When considering the financial implications of implementing the above, together with the
considerable expenditure of purchasing specialist equipment and selection and training of
personnel, it was found to be non-cost effective. Consequently, it is considered preferable to
outsource this service.
Outsourcing:
It is recommended that when outsourcing for TSCM, the following should be implemented:
Obtain at least three (3) Tender Proposals from recognised Specialist Agencies in the field of Technical
Surveillance Counter Measures. These tenders must be submitted on the basis of a detailed Brief
compiled and issued by the Manager Crime Intelligence, and requiring: