Loading...
Blog Featured Image

What is TSCM Debugging and How Does it Work?

In order to understand the role of TSCM debugging one must first understand the role of TSCM. This article will discuss what it is and how debugging has the capacity to ensure that surveillancedevices are detected and removed. If counter-surveillance equipment is installed, it is essential to ensure that these measures work the way as intended, without interference.

What is TSCM?

TSCM stands for TechnicalSurveillanceCounter-Measures which are electronic methods of employing counter-surveillance or finding planted surveillance technologies. This includes everything from visual and audio surveillance software to hardware. Today, it is often employed as a means to curb cybercrime.

In a nutshell, one doesn’t want people to see, hear or have access to sensitive information that was not made for their eyes and ears. This is when people take advantage and seek out sensitive information with insidious intentions.

Why is TSCM Necessary?

The ability to detect surveillance devices is increasingly important. Cybercrime is on the rise as more and more sensitive information is shared and stored digitally. This means counter-surveillance in the form of software and TSCM is more necessary than ever to protect businesses and the public alike. Encryption has been broken before and could be again.

“The Beginning” of Technical Surveillance and Electronic Countermeasures

Technical surveillance as well as electronic countermeasures andtheir encryption has been used by “the good guys”and “the bad guys” throughout history. Gathered information was usually used by state entities to protect and serve the publicwhereby commercial, diplomatic and military communication was safeguarded. However, technical surveillance is still a means of tapping into information that was not meant to be gathered. Therefore, from whichever angle it is viewed, TSCM is a necessity in today’s world.

Electronic countermeasures (ECM) originally started by deceiving radar and sonar waves. Today it has evolved to become even more dangerous in the use of aircraft ECM that make use of directional jamming to throw off missile co-ordinates.

Alan Turing was an English mathematician and is credited as the father of theoretical computer science. His machine, the Turing machine, can be considered the first model of a general-purpose computer. With the Turing machine he was able to crack the German forces’ messages that had been encrypted by the Enigma machine during the Second World War.The most recognised way in which this affected the outcome of the Second World War is the Nazis’ defeat at The Battle of the Atlantic. This breakthrough is theorised to have significantly shortened World War II and influenced, even alerted, the outcome. The Bank of England’s Governor, Mark Carney, recently honouredby Turing by using his likeness on the new £50 note.

The Enigma worked by encrypting messages with pins and contacts representing the 26 characters of the alphabet, seemingly randomly. The encryption was based in rotors and turnover positions which was later cracked by Turing’s mathematical equation,acting as the key to cracking the Enigma’s code.

Here we can understand the Enigma as employing TSCM which were well and truly “debugged” by Alan Turing and the Government Code and Cypher School at the time.

What is TSCM Debugging?

If Alan Turning could, theoretically, end the Second World War with the information he decrypted there is no saying what anyone could do with information intercepted now, no matter what their intentions may be.

TSCM debugging is removing audio/visual or other TSCM equipment from an area via a “sweep”. A “sweep” is the name given when looking for an electronic TSCM device by exploiting the radio waves they emit. When you “sweep” with a receiver, the radio waves emitted by the TSCM will make a sound, revealing its location.

Software is where countermeasures matter most now, to protect online data and privacy. Evaluating the risks and potential ways infiltrators could find a way in is the first step. Many privacy violations have taken place without the help of TSCM debugging like when a hacker took nude photos of Miss Teen USA 2013 by gaining unlawful access to her webcam.

TSCM debugging uses all the tools in its arsenal in order to remove any trace of eyes and ears where they are not permitted to be. Expertly trained staff as well as the correct tools ensure that your TSCM debugging is comprehensively completed once the “sweep” is done.

Contact D&K Investigations & Risk Consultancy if you have any suspicion that your home, office or even your car has been subject to electronic surveillance.

About D & K Management Consultants CC

Established in 1993 by Declan and Kyle Condon – the legacy of the Condon family with their many years of investigative expertise still strongly governs the running of the company today.

Phone: 082 820 5363

Email: saint@intrigue.co.za