Implementing TSCM For Corporations
Implementing TSCM For Corporations
Many high profile companies have successfully implemented TSCM as an integral part of their
information security strategy. Smaller companies, as well, have found that implementing such proactive
security measures early on helps prevent major problems later. Understanding the importance of
protecting communications and information helps to create an atmosphere where security inspections are
not only accepted but expected, and it helps to increase security awareness throughout the company.
Corporations should work to develop an atmosphere where proactive TSCM sweeps are an
accepted part of security in the workplace, protecting information assets as well as protecting privacy. We
have developed a simple three step process that all businesses can follow in order to integrate TSCM
inspections into their security programs. For more information regarding what is involved in a TSCM sweep
and how they are performed, please visit execsecurity.com/tscm.
This information was prepared by the team at Exec Security TSCM, www.execsecurity.com. We have been
providing professional TSCM services for over twenty years, with experience in many aspects of security
and electronic communications.
We can help you understand the risks, threats, and vulnerabilities that affect your business. If you would like
our assistance, we can start simply with discussions over the phone, but we can also present more thorough
recommendations after visiting your location for a site survey and assessment. Protection of your business
information is our primary concern.
When planning for information security, an important requirement is to establish a relationship with a reliable
and professional electronic countermeasures firm such as Exec Security TSCM. As a full-time TSCM
provider we are available for our clients at any time, not just for sweeps, but also for consultation when any
questions or concerns arise. We can arrange proactive inspections on a regular schedule or on short notice
for special events and other concerns. We are also available for immediate response when a security
incident may occur, and can help you decide on appropriate actions even when sweeps may not
immediately be necessary. Contact us with any questions you may have or if you would like assistance with
integrating TSCM and electronic privacy sweeps into your security program.
When undertaking this assessment, be sure to consult with a TSCM specialist. It is important to have a
professional, objective perspective included in your planning process.
Every business and corporation operates differently, so there are a variety of aspects to consider when
performing a risk assessment. Below are some examples that can help you start the process of
establishing which areas need the most protection.
Event Planning
Locations and schedules of meetings
Attendees or guest speakers
Executive Scheduling / Travel
Protection against kidnapping or attacks
Those seeking to harass, intimidate, or embarrass
Executive Protection and Security Details
Compromise of protection plans and procedures
Organized attacks
Most serious physical attacks on principals were preceded by covert
surveillance.
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400
Implementing TSCM for business.
Teleconference Rooms
Auditoriums
Executive Aircraft and Vehicles
Executive Residence
Remote Locations
o Hotel Suites
o Hotel Meeting Rooms
o Dining Areas
o Conference and Convention Spaces
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400
Implementing TSCM for business.
Understanding each type of sweep will better enable organizations develop strategies and policies
necessary to improve their privacy and security.
Scheduling proactive sweeps establishes corporate due diligence which is a critical part of
conducting duty-of-care for information security.
After determining the priority of the locations and areas discussed above, plan an appropriate
schedule for recurring TSCM sweeps. Typical and recommended schedules include:
Having your TSCM provider visit your facility regularly, especially during construction and other
infrastructure changes to your offices, is very important for protecting your information and the
overall health of your organization's privacy. Each visit establishes a benchmark for which future
sweeps and changes will be compared. If an incident were to occur in an office that is swept
regularly then your organization would be better able to understand what information may have
been compromised as well as have a better chance to discover the persons responsible.
Keep in mind that changes may occur over time in the functions or activities in your facilities that
could cause a need to adjust the priority level assigned to a certain location. The TSCM schedule
should be re-evaluated periodically.
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400
Implementing TSCM for business.
Event planners and those organizing the programs may not have privacy and information security
in the forefront of their minds, so it is important for the security professional to bring it to their
attention and see that arrangements are made in advance. Remember that on-site events as well
as off-site programs may need attention. On-site events might be held in less secure spaces and
they may bring guests or visitors into your facility that have not been thoroughly vetted.
The importance of electronic sweeps for off-site events is also underscored due to the fact that
security and access control at such locations are often less than what might be found at your
corporate facilities. A conference center or hotel, while they may be concerned about safety and
physical security, are also dealing with multiple guests and a variety of events and will not be able
to offer the level of attention needed for ensuring the confidentiality of your event.
Security considerations may need to include more than just pre-meeting sweeps:
“Real-time” monitoring and analysis of radio signals can be arranged to ensure no
unauthorized transmitting devices and no other compromise or interception occurs
during the meetings.
The TSCM team can also include a detailed inspection of the audio-video systems to
ensure they are not leaking information due to compromised conference lines or
unsecured wireless devices.
Control of cellular phones or other electronic devices (such as laptops) entering the
meeting may be desired. The banning of cell phones is one measure to help secure
highly sensitive meetings. This could also require physical inspection of attendees
through the use of magnetometers, X-ray machines, or other countermeasures
including walk-through cellular phone detection.
These should be planned well in advance of the meeting to ensure proper
preparations can be made.
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400
Implementing TSCM for business.
Reports of suspicious activity by employees may call for further investigation. Many
eavesdropping incidents are revealed because the perpetrator’s actions or comments
raised suspicion in fellow employees.
Cyber incidents may also involve electronic devices. Rogue access points and other
misuse of technology often go undetected by typical network security measures. A
professional TSCM team is equipped to conduct special cyber related tests including
wifi and VOIP inspections.
All security breaches should be considered cause for concern if they could have
allowed a breach of privacy or access to confidential information.
The TSCM response to any incident will be better implemented if regular, proactive sweeps have
been performed. Your TSCM team will already be familiar with the facility and be able to respond
in a timely and efficient manner whenever incidents do occur. Records from previous sweeps,
such as known radio signals and unique network attributes will allow a much more effective
inspection after an incident has occurred.
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400
Implementing TSCM for business.
Regularly scheduled sweeps also set a precedent, indicating that both information and verbal
communication are considered confidential and proprietary. This is critical where trade secrets are
concerned. If adequate information security measures are not in place, courts may conclude that
the information that was stolen or leaked was not truly confidential and therefore its theft may not
be prosecutable, and the information no longer classified as private.
Defining a clear proactive sweep policy will also enable the decision makers in your organization to
take a more active role in information security.
Special events
Establishing a policy for special events will help to ensure that the security of events is not
overlooked.
The need for TSCM inspections should be brought to the attention of the organizers as soon as
event planning begins, and can then be coordinated along with more traditional security
requirements. Event planning can be a long and complicated process so the sooner organizers
know about information security needs, the better prepared they will be.
Incident response
Company policies should include the consideration of electronic TSCM sweeps as part of the
response procedure for many types of incidents, both security and non-security related. The
occurrence of incidents such as a break-in or theft from a sensitive office should automatically
trigger an electronic sweep for surveillance devices. This does not mean that sweeps are needed
for every incident, but analysis of each incident should include consideration of information
security and privacy.
The same is true for departmental incidents, such as the termination of an employee under
suspicious circumstances. Legal, human resources, and financial departments all may have
situations that do not fall directly under security responsibility, but may require TSCM inspections
for protection of company secrets and privacy.
General Policy
Employees as well as executives should be aware of the need for information security. They
should also be encouraged to speak up if they suspect problems with security or privacy.
Clear policies will help employees recognize that the information they handle is considered
confidential, and they should know who to contact if they suspect something improper may be
going on. Many incidents of corporate eavesdropping are exposed due to another employee
reporting a suspicious occurrence or conversation.
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400
Implementing TSCM for business.
Department heads, such as legal, financial, human resources, and others, should know that
electronic privacy sweeps are readily available any time they may suspect a concern.
Distribution of responsibility
Based on the assessment of departments, locations, and their confidentiality, company policies
can also be designed so that some of the responsibility for scheduling TSCM inspections can be
shared with the various departments and locations. In this way the burden does not have to fall
completely on the security department.
This approach may not be appropriate for all organizations, but it is worth considering. Benefits
from this approach are multifaceted.
Departments and their employees will be prompted to think more seriously about
information security.
Department heads may have a better understanding of the confidentiality requirements of
their offices than would the general security department. By working together they will
provide better information security for the company.
Some of the difficulty of scheduling sweeps can be shared with the departments, possibly
freeing up security resources. There is still a need to coordinate the scheduling and the
results with the security management. The departments can be held accountable, though,
seeing that inspections are requested, scheduled, and carried out in timely manner.
Cost for sweeps can also be distributed to appropriate departments. Departments
handling classified information may then feel more responsible for its protection.
It is important, though, to establish protocols that are fairly simple and easy to enact. This will
ensure for more effective resolution of problems in the long term.
Conclusion
Protecting privacy and securing confidential information is one of the most important jobs of
security today, and as such, it should not be taken lightly. As evidenced above, there are many
reasons why TSCM inspections may be needed and also many ways they can be implemented.
Small businesses as well as large corporations are all in need of protecting their communications
and information. Smaller companies should not think that they are less of a target of espionage.
Their clients or their customers may include larger corporations and thus the smaller company
becomes an easier target than the more secure corporate facility. Their competitors may have
strong motivation to learn their confidential plans. A small manufacturing plant may be making
parts for a major international company. An accounting or consulting firm may be handling
accounts for their clients that require a high level of security. Smaller law firms may be working on
cases that affect large multinational corporations.
As an experienced and professional TSCM provider, Exec Security TSCM is happy work with you
to develop a plan that fits both your needs and your budget. Contact us with any questions you
may have.
© 2018 Charles Patterson, Exec Security TSCM Charles Patterson, President, Exec Security TSCM
www.execsecurity.com 914-819-5400