Professional Development TSCM Group Inc.
TSB Statistical Information
Have you ever had the uneasy feeling that your private and confidential correspondence, conversations, communications, or other forms of sensitive information were not as private as you would like?
If so, you may be the victim of one of the many difference forms of covert surveillance, electronic harassment, audio or visual eavesdropping, espionage or the target of an intelligence-gathering operation.
It is our experience at the Technical Security Branch (TSB) that most people who have reason to question whether or not they have justification to be concerned - Do in fact have reason to be concerned!
During the past thirty (35) years TSB personnel have conducted Technical Surveillance Countermeasure (TSCM) sweeps, and Counter-intelligence Surveys numbering in the thousands, with the following statistical results.
In 22% of these inspections, one (1) or more actual functioning electronic devices were discovered and removed by our Technical Security Specialists (TSS), or we were able to verify a non-electronic compromise of confidential proprietary information.
Of this 22%, 8% were of a domestic nature, 13% were related to business interests or corporate affairs, and 1% were related to covert vehicle tracking technology or Emergency Locator Transmitters (ELT) and Emergency Position Indicating Radio Beacon (EPIRB).
In our best estimation, it would also appear that in approximately 67% of the TSCM services preformed by our Technical Security Specialists (TSS), the client was not totally forthcoming as to the real reason for contracting our services, and therefore the actual risk could not be properly identified or established.
It should also be noted that our Technical Security Specialists (TSS) identified potential compromises in 100% of these TSCM inspections and provided recommendations to correct and improve the technical security posture of the target facility, area or residential property.
Covert surveillance may be electronic in nature or by a wide range of intelligence gathering techniques.
In fact, both of these methods are widely used in domestic spying, stalking incidents, gaining a business competitive advantage (internal or external, labor related disputes, or dissatisfied or disgruntled employees hoping to gain an edge within the workplace environment.
It is strongly recommended that all business environments regardless of size or perceived risk, consider a monthly or quarterly TSCM inspection schedule as part of a long term due diligence program with respect to the identification of technical security concerns and potential compromises.
In fact, when proprietary information or Research and Development (R&D) is a factor, various insurance policies require such inspections to be conducted in order to remain in force.
Kestrel TSCM ® Professional Software | Signal Intelligence Support System (SISS) TM
Canada & USA: 1-888-293-7384 | Toronto: (647) 293-7384 | Calgary: (403) 812-0737 | Ottawa: (613) 903-7577
Copyright © 2020 | All Rights Reserved
Last Revised: Saturday February 08, 2020 13:36:36