De-bugging (TSCM) is a technical and procedural service and each team has its own set procedure and this is ours in short form.
Our professional and rigorous approach is based on seven separate areas, utilising proven and required de-bugging techniques:
- Detection of radio emissions (benign & hostile)
- Detection of video emissions (benign & hostile)
- Telephone & communication system analysis
- Electronic analysis of utility cable and wiring
- Analysis of computers and peripherals
- Physical search & electronic structural examination
- Security analysis, report & recommendations
This section detects all frequencies so that hostile signals can be separated from benign local and national signals, such as, radio station, local taxis and WiFi.
In the event that only one area, for example, a single desk office, then this procedure should be carried out at a second location at least 100-200 meters from the target area. This will differentiate between ambient signals and hostile ones. This area of the survey is normally done in two ways firstly; silent mode (this will not alert the eavesdropper) secondly; with any audible tones used by the TSCM receiver to activate bugging devices.
Covert Panoramic Frequency Search A Panoramic Receiver is used to search the radio and microwave frequency spectrum, displaying all signals received. This is particularly helpful in detecting transmissions that 'hop' frequencies and eludes detection by normal counter surveillance equipment. The Panoramic Receiver also verifies unknown signals in areas of high ambient radio frequency, which may obscure normal discovery.
Covert Cameras & Video Transmission The section of our service will detect and locate any sub-miniature cameras hidden in the fabric of the building, items of furniture or office equipment.
Detection GSM & Bluetooth Surveillance Devices Modified Global System Mobil (GSM) telephone engines are used to reply room audio to anywhere in th world. These units can remain dormant when connected to the mains power supply. We use special counter surveillance systems to detect and locate even dormant devices.
A close analytical inspection and electronic testing of Direct Telephone Lines, Private Automatic Branch Exchange (PABX) Systems, Voice Over IP (VoIP) and other forms of communication is carried out using our telephone and wiring Analyser, the TDR 5000. With this equipment, several independent tests are applied to communication cable and wiring. These tests will detect any wired interception or transmission device connected to them, either live or dormant.
A close inspection of power cables and utility wiring is carried out using our Telephone and Wiring Analyser, the TDR 5000. With this equipment, several independent tests are applied to all power cables and any utility wiring.
Computers will be tested and inspected for Keystroke monitors. This form of intrusion takes two forms; firstly, Hardware Loggers, which is a physical device that is connected to the target computer and, secondly, Software Based, which are programmes that are loaded onto the computer. We search for the forma as part of our standard TSCM survey. Software based attached are an optional service.
Covert Electronic Structural Examination
A Non-Linear Junction Detector (NLJD) is used to identify devices deeply concealed within walls, furnishings, equipment and other items. This search will help with detection of dead, dormant devices and remotely activated units, not necessarily operating at the time of the De-Bugging sweep.
Physical Search of Identified Areas An intensive, close inspection is undertaken of all areas and equipment, eg, telephone instruments, fax machines, etc., together with associated wiring, power sockets and room furnishings. This search is designed to identify any area that has been subjected to interference at any stage. Although surveillance devices are usually recovered after having served their purpose, they will often leave telltale signs that a trained operative can recognise.
All telecommunication instruments, junction boxes and power sockets are vulnerable to attack. Where possible, instruments and boxes are sealed using a 'tamper evident' method. These seals should be regularly checked for any signs of interference.
A fully documented report is submitted on completion of our services. A limited risk analysis is included to identify vulnerable areas of the premises or equipment under inspection. Recommendations are made to improve future security of information.
There are a number of options that will accompany any de-bugging profile we supply on request.