top of page
Counter Surveillance.jpg

Counter Surveillance

Prevent Privacy Intrusion & Data Leakage

Pattern-05.jpg
Mr.-Ho-icon.jpg

Mr. Ho

Senior Security Consultant

TSCM Services is only a snap shot in time to detect and locate any electronic surveillance devices.

 

The continued “cleanliness” of the premises will rely on the implementation of security measures to control access to the premises by unauthorized personnel, and to conduct follow-up TSCM operations at regular intervals.

Counter Surveillance.jpg

We perform Technical Surveillance Counter Measures ("TSCM") to detect and prevent surveillance devices that may have been installed without authorization

TSCM%20Boardroom_edited.jpg

High Risk Locations:

  • Boardroom, Meeting Room

  • Executive's Office

  • Home, Private Vehicle

Common Spywares:

TSCM Boardroom.jpg

UCS's TSCM Service Includes:

  1. Detect unauthorized surveillance devices

  2. Identify privacy & acoustic leakage risks

  3. Recommend mitigating measures

Service Details

Stage 1:  Radio Frequency Detection & Scanning

We use various advanced equipment and tools to perform a full width (0-24GHz) inspection of the electromagnetic spectrum and identify any suspicious signal transmissions. The high grade equipment includes military grading radio frequency spectrum analyzers, radio frequency signal detectors, non-linear junction detector, alternating carrier current receiver etc.

 

Our security specialists utilize their many years of experience and training to ensure a full and comprehensive screening to uncover any transmitting unauthorized surveillance devices.

  

Stage 2:  Physical Inspection

After the scanning phase, our specialists perform a thorough physical inspection of high-risk electronic devices, electrical switches & sockets and ceiling to identify any non-transmitting unauthorized surveillance devices. ​

 

During this phase, we may find it necessary to open up or switch on properties / devices to facilitate the inspection and affix security labels or marks on properties / devices which have been inspected in order to ensure that they would not be easily opened and fitted with unauthorized surveillance equipment.

Stage 3:  Recommendation

 

After the inspection, we will provide a tailor-made report that includes a comprehensive summary of our findings, identified security risks or acoustic leakage and / or espionage by electronic surveillance devices.  In addition, this report will also outline our key recommendations to mitigate such risks.

 

We will suggest the implementation of risk mitigating measures such as access control, door lock and security surveillance, to secure clients against further non-sanctioned surveillance activities.

Meeting Room.jpg

Reason

for choosing UCS

  • We will suggest the implementation of risk mitigating measures such as access control, door lock and security surveillance, to secure clients against further non-sanctioned surveillance activities

  • Every TSCM service will be carried out by a professional team of 4-5 specialists, with the team head who was a member of the elite Special Duties Unit (SDU)

 

  • The scanning process is done with advanced, cutting edge TSCM equipment with a total value of above $700,000

 

  • Service is completely transparent and clients or their authorized persons are welcome to supervise the work

bottom of page