Interview with Counter Surveillance Expert

 

Assure Technical being interviewed after our Technical Surveillance Counter Measure (TSCM) presentation at the March 2014 Enterprise Security & Risk Management Conference in London.

 

 

You can watch additional videos or visit our  Counter Surveillance section for more information.

 

Contact Us Today for a confidential discussion regarding your requirements

 

Video Transcript

Today I’ve spoken about Technical Surveillance Counter Measures which is a counter intelligence role within the security industry, and how that fits into the Corporate market.

How does an counter intelligence role, within the security market, fit within the corporate market?

Every organisation has information assurance structure and a risk management policy.  When we look at security, and we look at security as a Physical element and as an Information Technology element.  What a lot of corporate bodies miss is that there is a gap in the middle.  A gap where espionage devices, technical surveillance devices, can easily mitigate the threat that’s posed to them by physical security and cyber security.

For instance, the use of passive sniffing devices has been noted in the press quite recently at financial organisations, used to gather information passively and then send that information out to an attacker.  Those devices will not generally be found by a physical security teams, and they’ll also generally not be found by information technology security processes.  So they are a specialist area for Technical Surveillance Counter Measures operators.

We call them proximal attacks.  Technological attacks which attack information from the inside.

 What would you like people to take home from today’s event?

Today I think the main message that I’d like to send people away with is that education in Technical Surveillance Counter Measures shouldn’t be overlooked.  A lot of the time, security officers, both physical and IT, perceive Technical Surveillance Counter Measures threat to be a Hollywood based threat, and they lack the understanding in threat, and the understanding in vulnerability assessment to effectively mitigate the risk.