Demystifying Cyber-TSCM Services
Global Security & Protection Group
? Trusted ? Discreet ? Professional Service ?
At Global Security & Protection Group we pride ourselves for provide world-class security consulting and protection services to our clients. Part of that service is education and we gladly take the extra time to provide context and explanation about the services we provide. As one can imagine, when it comes to cybersecurity and cyber-hygiene the questions usually compound. Therefore, we have included our answers below to questions often asked by clients during Cyber Technical Surveillance Countermeasure or Cyber-TSCM service engagements.
What is Cyber-TSCM?
Cyber-based eavesdropping threats can compromise a client's personal or business environment and result in private embarrassment or the theft of professional business secrets. To mitigate these threats, our Cyber-TSCM service includes the scanning of these potential eavesdropping threats and vulnerabilities within a client's Wi-Fi, Bluetooth & Cellular networks. These scans, often referred to as 'sweeps' include the monitoring of devices, networks, and other associated connections such as the popular Internet of Things (IoT) devices which also find themselves within the Cyber-TSCM umbrella. In addition, our Cyber-TSCM service also includes scans for spyware, malware, and malicious payloads via software that may have been installed on a client's devices and/or computer networks.
Are TSCM & Cyber-TSCM the same service?
Although TSCM and Cyber-TSCM are indeed two halves of the same coin, the two target different threat avenues and require unique skill sets. TSCM is an acronym for Technical Surveillance Countermeasures, which focuses on the scanning 'sweeps' that target traditional electronic eavesdropping devices. Such devices are, generally speaking, tangible items that can be physically recovered by a TSCM analyst during the course of a 'bug sweep' service.
Traditional TSCM also includes physical wire tapping where the eavesdropper can access the information from the tap location along the line. Ultimately, this means that an eavesdropper faces a high risk of detection when installing the device and/or when recovering the eavesdropping device(s) from the collection site.
领英推荐
Cyber TSCM, as previously mentioned, focuses on exploitable networks, devices and/or connections that serve as targets to steal valuable client data and/or compromise their privacy. Generally, the cyber attacker faces a significant lower risk of detection while utilizing such technological means to eavesdrop on their victims since they do not have to physically return to the collection site to recover the electronically gather information. As well, access to information can be long term if the eavesdropping devices are energy efficient (sound or motion activated), the cyber access cannot be quickly stopped, or the use of a virtual private network (VPN), phone number spoofing apps, or generic email addresses can mask the digital trail (and identity) of the eavesdropping attacker.
What makes a Cyber-TSCM service essential?
The securing of information and proactive management of personal and professional cyber risk in our increasingly connected data driven world is critical. Personal and business related data is continually created, transferred, or stored on devices and/or on networks. Without the proper security, an attacker can exploit these networks, devices and/or connections to steal valuable client data and/or compromise their privacy.
There are many access points for an attacker to exploit a client's smartphones, remote cloud data storage, wi-fi camera systems, remote access security apps, smart assistants (e.g. Alexa), employee personal devices (BYOD to work). Global System for Mobile (GSM) audio or hybrid bugging devices, and others add complexity to the task of protecting confidential or private information.
To best mitigate these threats the appropriate technical security measures for detection and prevention must be implemented on a reoccurring basis, hence the use of the term: cyber-hygiene. Our team of cybersecurity professionals understand the complex nature of these threats and how to appropriately leverage cyber-TSCM solutions to mitigate a client's environment from intrusion and exploitation.
Global Security & Protection Group (GSPG) is a full-service global security company headquartered in Houston, Texas. GSPG provides an array of security consulting and protective services tailored to meet each client's security needs and threat environments. The GSPG team of security consultants leverage industry best practices and cutting edge technologies to keep our clients safe and their businesses thriving.