Technical surveillance counter-measures
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
TSCM (technical surveillance counter-measures) is the original United States Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance. It is related to ELINT, SIGINT and electronic countermeasures (ECM).
The United States Department of Defense defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility.
This definition is however lacking some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.
Technical Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.
Methodology
Radio frequencies
Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like burst transmission and spread spectrum make detection more difficult.
The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat detection.[1]
Devices that do not emit radio waves
Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs.
Very sensitive equipment could be used to look for magnetic fields, or for the characteristic electrical noise emitted by the computerized technology in digital tape recorders; however, if the place being monitored has many computers, photocopiers, or other pieces of electrical equipment installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search.
Another method is using very sensitive thermal cameras to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera.
A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the electromagnetic spectrum.
Technology used
This section needs expansion. You can help by adding to it. (June 2008) |
Technology most commonly used for a bug sweep includes but is not limited to:
- Multimeters for general measurements of power supplies and device components.
- Time-domain reflectometer (TDR) for testing the integrity of copper telephone lines and other communication cables.
- Frequency scanner with a range of antennas and filters for checking the electromagnetic spectrum for signals that should not be there.
- Oscilloscope for visualisation of signals.
- Spectrum analyzer and vector signal analyzer for more advanced analysis of threatening and non threatening RF signals.
- Nonlinear junction detector (NLJD) for detection of components associated with hidden eavesdropping devices.
- Portable x-ray machine for checking the inside of objects and walls.
- Computer security devices and tools for computer-related threats.
- Tools for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check.
- Thermal imaging helps find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components.
- Flashlight one of the most important tools to have beside a ladder for providing a competent sweep.
See also
- Interagency Training Center, the U.S. government's TSCM training facility
- Telephone tapping
- Covert listening device
- Espionage
- Privacy
- Military intelligence
- Communications security
- Secure telephone
- Security engineering
References
- ^ Braunig, Martha J. (1993). The Executive Protection Bible (1993 ed.). Aspen, Colorado: ESI Education Development Corporation. p. 147. ISBN 0-9640627-0-4.
{{cite book}}
:|access-date=
requires|url=
(help)
External links
- Listening In: Electronic Eavesdropping in the Cold War Era, US Department of State, Bureau of Diplomatic Security, 2008
- A simple guide to TSCM