Technical Surveillance Counter Measure (TSCM) Process

Assure Technical explaining the stages of Technical Surveillance Counter Measures at the March 2014 Enterprise Security & Risk Management Conference in London.



You can watch additional videos or visit our  Counter Surveillance section for more information.


Contact Us Today for a confidential discussion regarding your requirements


Video Transcript

This is the kind of cycle that we had to go through. Sweeping, Technical Surveillance Counter Measures, isn’t about turning up and saying this area is clear, yup. It’s far more than that again, it’s not about putting a lock on the door just when you need it.

So reconnaissance, it’s necessary work of time analysis. How long is it going take? What am I going to need? Who do I need? Do I need any special kind of people to do the systems that are there?

Threat assessment and vulnerability assessment. This should be done for every single area for every single case, otherwise we don’t understand the threat. We can’t calculate the vulnerability and risk, therefore, we can’t mitigate against that risk.

And the planning phase. Operational phases – in the Olympics, we used phase one as phase two strategy, whereby phase one was the empty building, so the empty royal box, the empty secure rooms, before anybody who moved into them. In that case, we look for deep plant devices, devices which have been built into the fabric of the building. Phase two when people start to work there, covers all kind of threat vectors.

And recovery. The most important phase, I think. Reporting, okay? Mitigation of any vulnerabilities or threats which we have identified, maintenance and then planning for the next round. So if we had 12 or 14 secure areas look after, each one of those steps is followed through to the planning stage where we plan for the second phase of that sweep.

Okay. Thanks very much for listening. If you got any questions now, I’ll be glad to take them down there.