TECHNICAL SURVEILLANCE COUNTERMEASURE SERVICES - Investigative Services - Discreet Investigations Consultants Africa

TECHNICAL SURVEILLANCE COUNTERMEASURE SERVICES

What are Technical Surveillance Countermeasures Services?

Technical Surveillance Countermeasures (TSCM) is a service provided by a professional team to help keep your home, office, and other spaces secure from those who wish you or your business harm. Having a team of private investigators to assist in your services, is imperative to the privacy of information and confidentiality. TSCM also refers to bug sweeps, sweeping, debugging. 

This is where we come in here at The Discreet Investigations Consultants Africa. Our bug sweeps and other forms of TSCM services are proactive, fully complaint, and optimized with care based around the precise risks and needs you are met with. Learn more about the fundamentals of these services and get in touch with our team today for assistance.

 

TSCM Services We offer


We’re prepared to assist you in the following ways and more as part of our dedicated bug sweeps and other TSCM capabilities.

• Comprehensive inspections, monitoring (including remotely), analysis, and RF spectrum interrogations upon request
• Reporting on findings to help ensure an effective resolution
• Advisory services to ensure informed clients and an optimal custom TSCM approach
• Reviewing properties/assets/TSCM feasibility before, during, and after renovations, construction, and other projects that potentially introduce risk elements
• Search-and-rescue capabilities through the tracking of homing beacons, emergency transmitters, and other deployed communications technologies
• Proactive planning and risk assessments to determine weak areas/issues in most urgent need of appropriate countermeasures
• Equipment and strategy verification and refinements based on your needs
• Informative guidance and educating employees/employers on best practices

Devices/Equipment We Use


Depending on what you require of our TSCM services, some or all of the software and/or hardware below may be utilized as we carry out our duties:

• FLIR T1020 infrared (IR) camera
• Optic2 optical camera detector
• FLIR E76-14
• RadioInspector software
• Wi-Fi inspection system
• Krypto500 / Krypto1000 software for signal decoding
• Cayman 402/403, Lornet-24, RECON 2.4, LUX, and other non-linear junction detectors
• Under-door viewer (UDV)
• P.C. pro pole camera
• Spider 301 wireline analyzer
• ST 600 bug and camera detector
• EARWIG stereophonic stethoscope (STS)
• CO2 detector (gas data, hidden person)
• OCD20 camera lens detection system
• Cellular Safe 22
• Nanuk and/or Pelican cases

 

Possible signs of compromise


  • Other parties are aware of confidential information
  • Information during private meetings or conversations has become public
    Your activities are known to people when they shouldn’t be
  • Static or popping sounds on your phone lines
  • Noise from phones that are not in use
  • Tones or high-pitched sounds heard when the phone is picked up
  • Televisions or radios begin exhibiting interference
  • A break-in has occurred, but nothing is taken
  • Electrical and light switch wall plates have been tampered with
  • Gifts from vendors, customers, or friends, or strange objects appearing without your knowledge
  • Drywall or ceiling tile debris is visible on desks, tables or floors
  • Ceiling tiles are broken or out of place
  • Unknown vehicles appear nearby and remain suspiciously