Corporate and Private Sector
Technical Surveillance CounterMeasures (TSCM)


      Any activity initiated or information gathered in order to prevent, block, obstruct, impede, or restrain any espionage, sabotage, or other intelligence collection efforts performed by, or on behalf of, foreign governments, industries, organizations, or persons.

    Tamberlane CounterIntelligence (both corporate and private):

      Tamberlane's TSCM efforts essentially include three endeavors: 1) an on-site technical surveillance, 2) a physical sweep of the possible bug / wiretap locations, and 3) a countermeasures effort. The technical and physical surveillance of the target facility and its environment is accomplished by highly experienced, technically-educated technicians using state-of-the-art equipment to prosecute the facility. Suggested countermeasures are employed to prevent and detect the interception of sensitive, classified, or private information are then proffered based on the findings and procedures in place to prevent an attack.

    The TSCM endeavor normally consists of the following avenues:
    1. Client initiates a secure contact to us using a phone that is not on the target site. Initial briefing meeting will be in a sterile location away from the suspect facility.
    2. Pre-Inspection Threat Survey (if pertinent and applicable)
      1. Review of facility blueprints as well as current information security policies and procedures.
      2. Escorted visit to the site(s) and their environs to determine physical security measures required to protect against technical attack and penetration as well as unaided audio leakage.
      3. Vulnerability analysis (external RF atmospherics survey, phone and structural audit, probable listening posts, and development of threat model).
    3. Technical Surveil (comprehensive electronic, visual, and physical examination)
      1. Silent / non-alerting passive "naked" walk-thru during business hours.
      2. Auto bug, wireless detection, and initial VLF inspection (AC, telecom, LAN, and HVAC identified). Non-linear junction.
      3. Passive inspection (full passive Radio Frequency spectrum and light spectrum survey).
      4. Active inspection (normally after hours) – Physical inspection of targeted offices and structures. Telephone equipment and line analysis.
    4. Verbal Briefing
      1. Anomalies and findings.
    5. Post-Inspection Brief and Follow-Up
      1. Anomalies and findings.
      2. Post-inspection of site a couple weeks later (full passive RF and light spectrum sweep) to identify if attacker(s) have reinstalled anything; provided they knew we were coming and removed their units prior to our work.
    6. Final Technical Vulnerability Report to the Company
      1. Written and verbal report.
      2. As written and agreed to in the contract for TSCM services, upon discovery of any clandestine and illegal device(s), this agency will take pictures and analyze the device in-place and then advise the client, their legal authorities and in due course, the proper law enforcement agency of the finding. The client company needs to understand that not only are state laws being violated but more importantly, Title III federal laws are as well.

    Why is spying rampant in the corporate, industrial, and business worlds?
    • New Product Developments and Plans
    • Mergers and Acquisitions Plans
    • Protection of Financial Information
    • Protection of Trade Secrets
    • Labor Union Disputes
    • Industrial Spies (other companies and/or countries)
    • Negotiating Strategies
    • Corporate Legal Problems
    • Employee Spying

      Just to name a few...

      The Senate Select Committee on Intelligence identified a dozen foreign governments that “promote, direct, and orchestrate” clandestine efforts to collect other countries economic secrets or proprietary information for the benefit of their own industries. The top named countries included on the list were: France, Israel, China, Russia, and India.

    Compiled by 38 federal law enforcement agencies, the following statistics* detail industrial or corporate espionage techniques (frequency of usage):

      71% - Audio Interception & Wired Microphones

      17% - Computer Usage Monitoring (Microsoft 2000 threat)

      83% - Closed Circuit Television or Covert Video

      60% - Audio Transmitters

      17% - E-Mail Monitoring

      68% - Still Photography

      43% - Electronic Beepers, Tracking Devices, & Sensors

      14% - Cellular Radio Interception

      40% - Telephone Wire Taps, Recorders, & Pen Registers

      63% - Night Vision Systems

      11% - Satellite Interception

      * This is at a minimum based on “reported” incident findings. Most incidents of industrial-corporate espionage are not reported due to a company policy, inhibition, embarrassment or simply not knowing where to go with the finding or who to trust with their information.

    Intellectual Security Precautions EVERY Business Needs to Know:

      Who spies? Competitors, Vendors, Business Intel Consultants, Colleagues Vying for positions, Overbearing Bosses, Suspicious Partners, The Press, Labor Negotiators, Gov't. Agencies... The List is Endless.

      Why would I be targetted? Money and power are the top two reasons behind illegal surveillance. If anything you say or write could increase someone’s wealth or influence, you could be a target.

      Is snooping common place? YES... The news is full of stories about stolen information (most news begin with leaks). Most incidents never make the news due to potential embarrassments.

      Can I protect myself? Yes... Business espionage is preventable. If you know the vulnerabilities, you can take proper security precautions.

    Top 10 Business Espionage Tricks Used Successfully Over and Over Again:

      1. Trash Trawling (sifting through garbage)
      2. Bugs and Wiretaps (rooms and phones)
      3. "Drop-By" Spies (outside workers)
      4. Computer Hacking and Cracking
      5. Mobile Phone "Leeches" (cellular and cordless)
      6. Technology Traitors (everyday devices)
      7. Meeting "Chameleons" (shows, seminars, etc.)
      8. "Give Aways" (unlocked offices, drawers, paperwork on desk, etc.)
      9. Business Phone Attacks (feature-rich phone systems)
      10. Treason ("trusted" employees)

    Snoop / Spy Composite Profile:
    * National CounterIntelligence Center, Wash. D.C. - Business Controls and Countermeasures

      Female as often as male, college graduate with low value degree, broad short-term employment history, money problems, military intelligence experience and/or acquaintance(s) with law enforcement backgrounds, disability precluding a law-enforcement career, considered an outsider or loner, no police record, thrill seeker with romantic interests in risky endeavors (skydiving, scuba, etc.), collects underground and/or paramilitary literature, active interest in firearms, abilities in music, chess or math (code breaking skills), often just a drone (agent) of a professional handler.

Integrity, Knowledge, Confidence, and Confidentiality...
Virtues that have Given Our Clients Answers and Peace of Mind Since 1979