The TSCM Threat

Could you be a target for covert eavesdropping, filming or phone tapping?

If eavesdropping on your private conversations or business meetings increases the likelihood of a competitor or associate gaining a financial or personal gain, then yes you are a potential target.

Warning Signs

  • Your radio or television has unexplainably developed reception problems
  • You have noticed curious sounds or volume changes on your phone lines
  • Furniture has been moved without explanation or good reason
  • Door locks or key code pads appear loose / tight / scratched or just operate differently
  • You have been burgled, however nothing of obvious value has been taken
  • You return home to discover your pets are outdoors or have access to parts of the property usually out of bounds
  • Electrical wall plates appear to have been moved slightly
  • Dust can be seen on the floor close to wall sockets or other fixings
  • Your work place is unusually dusty or unusually clean
  • Small areas of decolourisation can be noticed on walls, doors or ceilings

Additional Signs

  • Competitors have supplied you with electronic gifts, pens or other items of office stationary
  • Employees are importing personal equipment into the environment that have no business use
  • Your vehicle(s) radio has moved station or lost a number of pre-set channels
  • Unexpected maintenance workers attend your home or business
  • You regularly notice unattended maintenance vehicles close to your home or business

Corroborating Signs

  • You hear unusual sounds regularly coming from your phone even when not in use
  • Your phone regularly rings with no caller on the line
  • Topics from confidential / secret meetings are known to others
  • Your business ideas and bids are being replicated or negated
  • Your competitors appear ‘overly’ confident during high profile negotiations

The above indicators provide a snap shot of several physical signs relating to the placement of covert devices; however, should you be experiencing more than three of the aforementioned signs it is highly likely that you are being subjected to hostile surveillance. What should you do?

What should you do?

Stay calm and carefully consider the following questions:

  • Am I being over sensitive?
  • Could my business and home security measures be easily compromised?
  • Who would gain from such activity?
  • What are they truly after?
  • What do they already know?
  • What effect will this have on my business and family?
  • Where am I most vulnerable?
  • Can I orchestrate some form of initial damage limitation?

These questions form the basis of the NPI initial Vulnerability and Threat assessment which is an essential process which helps identify, and then counter, all forms of hostile surveillance. It is from this primary assessment that an accurate reflection of the situation can be established. Once at that juncture a proportionate and measured response can be formulated.