TSCM in the 21st century

April 2017 Security Services & Risk Management, Information Security

When talking about security and risk management, cyber is the new buzzword. The authors Refsdal, Solhaug and Stolen in their book Cyber-Risk Management explain, “Due to cyberspace and its underlying infrastructure, people and organisations have access to more and better services than ever before”. They go on to say that cyberspace has introduced and “continues to introduce, numerous new threats and vulnerabilities.”

Steve Whitehead.
Steve Whitehead.

Many of these new threats and vulnerabilities can both be identified and countered with the appropriate level of technical surveillance countermeasures (TSCM) services. In addition to the cyber communication threats, we have seen a tremendous growth in surveillance-enabling technologies over the last decade. Devices operating on GSM, GPRS, UMTS, LTE, Wi-Fi and Bluetooth are found in every business and residence.

New technologies such as the Internet of Things (IoT) are rolled out on a daily basis without considering the technical surveillance threats that come along with these technologies. (IoT is the incorporation of electronics into everyday items that allows them to be connected to each other). IoT devices are deployed in the banking, financial, medical, agricultural, industrial, oil, gas and motor industries, to name a few.

In the May 2015 edition of this magazine, in the article ‘How eavesdropping-resistant is your organisation’, I wrote that risk managers, security professionals, information protection officers and facility managers need to understand the threat of modern technical espionage.

It is however equally and sometimes more important that those offering technical surveillance countermeasures (TSCM) services in South Africa themselves pay attention to key trends, new technologies and new threats, and adapt their service offerings accordingly to stay relevant. There is no longer space for outdated services, training or equipment when it gets to the safeguarding of sensitive information and data.

A snap survey during January 2017 among local TSCM service providers showed that there is reason for concern about the current levels of TSCM services offered in South Africa. There are only two companies in South Africa that can offer an up-to-date modern-day technical surveillance countermeasures service to corporate South Africa.

The role of TSCM in the cyber world

Charles Patterson, a TSCM professional from the US recently wrote: “where cyber and physical security almost meet is TSCM”. Patterson says, “Both cyber and physical security are necessary, but there is an area in between that neither one extends into. That is where TSCM sweeps are needed”.

J.D. LeaSure, director of the Espionage Research Institute International (ERII) (USA), has been talking for a number of years about this area that Patterson refers to and has named it Cyber TSCM. It extends beyond the traditional practice of TSCM. His presentation, ‘The Dragon in the Machine’ at the CBIA Business Counterintelligence Conference at the Kwa Maritane Bush lodge in September 2012 explained how an organisation’s data and Wi-Fi networks were exploited to steal corporate information, and the need for Cyber TSCM that goes beyond the traditional approach.

Since then, many TSCM service providers around the world have made the paradigm shift and are now offering Cyber TSCM surveys to counter the most modern threats. We are also seeing various strands of Cyber TSCM developing in different parts of the world.

Professional TSCM teams now offer a superior technical countermeasures service which incorporates additional services to identify how sensitive, classified and secret information as well as data could be intercepted, lost or stolen, no matter what the communications medium.

To be able to offer services on such a high level requires total commitment, a deep understanding of counterintelligence principals and a range of sophisticated equipment that covers a wide range of communication technologies. The size of a professional TSCM team has also increased, and a typical cyber TSCM team now consists of a minimum of four to five members.

What to expect from a TSCM service provider

Security and risk managers should expect high standards from their technical surveillance countermeasures (TSCM) service providers.

Proactive and regular TSCM surveys keep a company’s security one step ahead. It will ensure compliance with the King IV corporate governance requirements regarding information security risk management. King IV says technology governance and security have become critical issues. “Technology is now both the source future opportunities and of potential disruption.”

If listed companies do not conduct regular TSCM surveys of their sensitive areas, it could be argued that they do not take prudent and reasonable steps to safeguard their information against possible technical attacks. The same could be true if a company selects an outdated service provider who does not comply with the minimum accepted requirements regarding training, experience and equipment.

There are six easy tests to follow when selecting a Cyber TSCM service provider. The following which are adapted from some of my previous work can be requested during the initial contact with the service provider:

1. Enquire about and request proof of training in the field of technical surveillance counter-measures. Request proof of training at recognised TSCM training organisations as well as certification on the equipment;

2. Enquire about their equipment. Attacks occur on various levels and contrary to many claims, there is no quick fix or any special black box or briefcase containing gadgets that can detect all eavesdropping devices. Look for equipment names such as Oscor Blue/Green spectrum analysers, ANDRE and WAM near field detectors, Kestrel SDR, TALAN Telephone and Line Analysers, Orion and SB Non-Linear Junction Detectors (NLJD), GSM and Wi-Fi detection equipment, thermal imagers and network tools. If you do not see these then they do not have the latest and most modern equipment available in South Africa to service providers.

3. Enquire about the prospective service provider’s survey procedure and checklist and verify that they follow an action plan.

4. Membership of Professional Associations. There are only three associations in the world that cater for and recognise TSCM professionals. They are the Espionage Research Institute International (ERII) (USA), TSCM Institute (TSCMi) (UK) and Business Espionage Countermeasures South Africa (BECSA) (RSA). BECSA has a dedicated portal for trained and qualified local TSCM practitioners. These associations will gladly confirm and verify the status of a prospective TSCM service provider.

5. Written technical report, analysis and recommendations. On completion of the survey a report should be submitted detailing the tests conducted and the findings of the survey. The report should include a record of the signals found and analysed (including GSM, Wi-Fi, Bluetooth and narrowband IoT), telephone measurements obtained (including analogue, digital and VoIP) as well as other electronic and energy signals detected and evaluated. Procedures on the actions that should be taken if an eavesdropping device is found have to be discussed before the commencement of the survey.

6. Certificate of Quality. The service provider should carry calibration certificates or a certificate of quality regarding the equipment that they use during a survey on your premises. This certificate issued by the manufacturer or its representative should state the following:

• That the equipment is of the latest generation software and version;

• It is in proper calibration and operating procedures as defined by the manufacturer’s specifications and factory standards; and

• Has been tested at the manufacturer or its authorised representative’s facility within the past twelve (12) to eighteen (18) months. This is necessary to prevent that your premises are checked with old and outdated equipment.

Conclusion

TSCM is an important function. To counter technical surveillance threats in the cyber world is not an easy task. TSCM has become much more complicated and requires a whole new approach and an array of appropriate equipment, training and lots of new experience. We have reached a point where prospective service providers who did not keep pace with all the changes will simply disappear.

The demand for professional TSCM surveys will continue to grow as the technical threats escalate and the gap between physical and IT security widens.

TSCM is about risk management. Failure to implement an appropriate TSCM programme could lead to a risk of operation, disruption, intellectual property loss, public embarrassment and reduced trust in an organisation’s ability to protect its information.

For more information contact EDS-TSCM, [email protected], www.tscm-za.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...
Building a solid foundation
Alwinco Security Services & Risk Management Asset Management Residential Estate (Industry)
Understanding the roles of a Risk Assessor and a Risk Manager is like building a solid and secure foundation in the security world. Andre Mundell makes it easy to understand.

Read more...
Using KPIs to measure smart city progress
Axis Communications SA Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
United 4 Smart Sustainable Cities is a United Nations Initiative that encourages the use of information and communication technology (including security technology) to support a smooth transition to smart cities.

Read more...
Enhancing estate security, the five-layer approach
Fang Fences & Guards Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
Residential estates are designed to provide a serene and secure living environment enclosed within gated communities, offering residents peace of mind and an elevated standard of living.

Read more...
AI and ransomware: cutting through the hype
AI & Data Analytics Information Security
It might be the great paradox of 2024: artificial intelligence (AI). Everyone is bored of hearing it, but we cannot stop talking about it. It is not going away, so we had better get used to it.

Read more...
Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Read more...
Detecting humans within vehicles without opening the doors
Flow Systems News & Events Security Services & Risk Management
Flow Systems has introduced its new product, which detects humans trying to hide within a vehicle, truck, or container. Vehicles will be searched once they have stopped before one of Flow Systems' access control boom barriers.

Read more...
A standards-based, app approach to risk assessments
Security Services & Risk Management News & Events
[Sponsored] Risk-IO is web-based and designed to consolidate and guide risk managers through the whole risk process. In this article, SMART Security Solutions asks Zulu Consulting to tell us more about Risk-IO and how it came to be.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...