Basic course in electronic eavesdropping countermeasures

February 2004 News

TSCM's basic course in electronic eavesdropping countermeasures, presented since 1998, is suitable for the individual who has no or little previous experience in technical surveillance countermeasures.

The 90-hour course is presented over 10 working days. The course has been designed to allow prospective technical surveillance countermeasures practitioners to develop the necessary basic knowledge and skill to provide countermeasures services and consultation for their companies.

The course is endorsed by CASA and recorded at the South African Qualifications Authority (SAQA). The course will introduce the attendee to the technical and real-life status of current eavesdropping threats and ways to detect and counter them.

All phases of electronic countermeasures are covered and hands-on experience is acquired through the use of various manufacturers' equipment.

At the completion of the course the attendee will be able to:

* Analyse electronic vulnerabilities in office and residential environments.

* Evaluate equipment performance and make informed purchasing decisions.

* Be able to select and appoint outside technical surveillance countermeasures consultants.

* Perform electronic eavesdropping surveys (sweeps) and advise management/clients/customers regarding technical counter-measures services, policies and procedures.

You should consider attending this course if you are:

* Responsible for the protection of information.

* Offering technical surveillance countermeasures services.

* Employ or sub-contract technical surveillance countermeasures service providers.

* Responsible for risk or loss control functions in your company.

* Are interested to learn more about this specialised field.

Two courses are scheduled for 2004. The course dates are 8-19 March and 5-16 July 2004. The courses are presented at the Buffelspoort Conference Centre, Marikana.

For more information contact Steve Whitehead, TSCM Services, 012 664 3157,, www

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Quantum secret sharing
Issue 6 2020 , News
Wits researchers have demonstrated a new quantum approach for sharing a secret amongst many parties, setting a new record for the highest dimensions and parties to date.

Three cash-in-transit heists in half an hour
Issue 6 2020, Fidelity Security Group , News
Over the past six weeks the cash-in-transit industry has experienced a spike in the number of heists across the country.

Programme to assist smaller MSSPs
Issue 6 2020 , News
Networks Unlimited launches new MSSP partnership with SentinelOne to make endpoint defence more accessible.

Fake uniforms and using falsely branded security vehicle
Issue 6 2020 , News
On Monday 10 August, six to ten armed suspects driving what appeared to be a branded Fidelity ADT vehicle and wearing security uniforms entered a business park.

From the editor's desk: Covid consolidation
Issue 6 2020, Technews Publishing , News
The global security industry has seen quite a few high-profile mergers and acquisitions over the past year or two, with an even greater number of smaller companies that don’t get the headlines also merging, ...

ONVIF adopts open source development
Issue 6 2020 , News
ONVIF announced it is open sourcing its network interface specifications for physical security technology.

Hored networking solutions now in South Africa
Issue 6 2020, LD Africa , News
LD Africa is the sole South African distributor for Hored smart networks and smart transmission solutions.

Suprema wins SIA award
Issue 6 2020, Suprema , News
Suprema Airfob Patch wins Judges’ Choice Award from SIA New Product Showcase.

Digitisation during COVID-19
Issue 6 2020, PSIRA (Private Security Ind. Regulatory Authority) , News
The COVID-19 pandemic has forever changed how business is conducted globally and PSIRA adapted to serve its community.

Datacentrix boosts security portfolio
Issue 6 2020 , News
Datacentrix has joined the Tenable Assure Partner Programme, strengthening its security portfolio with cyber exposure solutions from Tenable.