How eavesdropping resistant is your organisation?

May 2015 Security Services & Risk Management

Fortune Magazine reported on 25 July 2014 that Sharon Leach, a mechanical engineer with a doctorate and a loyal employee of the Ford Motor Company, was fired after eight listening devices were found in boardrooms and meeting rooms on the executive floor at Ford HQ. The listening devices were found during a TSCM survey.

Subsequent investigations led the FBI to Leach. The FBI is investigating a case of possible economic espionage. Would you know if covert surveillance devices are installed in your company boardrooms and sensitive areas?

If an organisation could be that vulnerable to covert surveillance in its own offices, then just think how the risk increases when companies conduct sensitive business away from the safety of the office.

Many executives prefer to have their annual strategic planning sessions, team building and other important business meetings away from their offices. These events usually take place at luxury hotels, lodges and resorts. The security perimeter, access control, firewalls and other levels of protection that are in place at the office is usually not in place at these outside venues.

It is sometimes much easier for a would-be spy to place a bug, listening or other type of surveillance device in an outside meeting venue than at the office building where there are many layers of protection and security.

There are many reasons why companies and company executives could have covert surveillance or listening devices in their offices, boardrooms, residences and outside meeting places. If an individual occupies a sensitive position in government or in business, others might be interested in what that individual is doing. A company might be embroiled in a dispute, could be involved with very delicate negotiations, a new business deal, new innovations, research, telephone conversations and meetings with foreign partners and other companies.

South African businesses must accept that as they attempt to be more competitive in the global markets, that their products, processes, information and trade secrets may come under threat from competitors.

Clandestine surveillance is nothing new. During its evolution it has progressed from the simple act of peering through the bushes to the point from where conversations are now monitored and data intercepted from the outside via GSM, Wi-Fi, Bluetooth and other exotic modulation schemes.

Meeting the TSCM challenge

Risk managers, security professionals, information protection officers, facility managers and others responsible for protecting their organisations and facilities need to understand the threat of electronic surveillance. The growth in surveillance enabling technology in recent years has made the technical aspects of electronic surveillance detection far more complex.

The purpose of a technical surveillance countermeasures (TSCM) survey is to identify and to localise possible covert surveillance threats (audio, video, optical and esoteric attacks) as well as any other way in which confidential business or government information could be intercepted, lost or stolen.

Typical projects by a professional TSCM company include debugging and sweeping services, support of personal and VIP protection programmes and the provision of secure environments to ensure privacy so that business can be conducted securely.

Proactive and regular sweep surveys keep a company’s security one step ahead. Organisations and security managers should not wait until they think “they are being bugged”.

Proactive and regular sweeps will also ensure compliance for listed companies with the King III corporate governance requirements regarding information security risk management. King III (section 5) stipulates that “in exercising their duty of care, the board of directors should ensure that prudent and reasonable steps have been taken with respect to information security”.

If companies do not conduct regular TSCM surveys of their sensitive areas it could be argued that they do not take prudent and reasonable steps to safeguard their information against possible technical attacks. The same could be true if a company selects a service provider who does not comply with the minimum accepted requirements regarding training, experience and equipment.

Selecting a service provider

The purpose of a TSCM survey is to detect the presence of technical devices and technical security weaknesses that could aid in the conduct of a technical penetration. The survey has to provide a professional evaluation of a facility’s technical security posture and will consist of a thorough visual, physical, technical and electronic examination of the facility.

A consultant who also claims to be an expert on “firearm training, tracings, security surveys, company checks, fraud claims, undercover agents, matrimonial matters, criminal and civil investigations, locating missing persons and concealed assets, VIP protection” etc., to name but a few services, might not be the correct person when looking for a professional and specialist TSCM service provider.

In recent years the technical aspects of electronic surveillance detection have become much more complex. The growth in surveillance enabling technology and new terminology such as convergence, GSM, GPRS, IP, Bluetooth, VoIP, Wi-Fi, SD memory cards, miniaturisation and wireless communications requires specialised equipment when conducting TSCM surveys.

With the advancements coming out in release 12 and 13 from the 3GPP, the Internet of Things (IoT), expanding Wi-Fi applications (also used for covert surveillance), the advancement in digital audio and video transmitters, the traditional way of conducting debugging and sweeping creates a false sense of security.

There are at the most only three companies in South Africa that can provide a proper professional 21st century cyber technical surveillance countermeasures survey.

The association Business Espionage Countermeasures South Africa (BECSA) caters for counterintelligence and TSCM practitioners and have a list of qualified and professional TSCM practitioners in South Africa. Proof of BECSA membership is a good indication to help prospective clients separate the wheat from the chaff. (See side bar for some other questions to ask when selecting a TSCM service provider.) If the service provider cannot conduct the services or answer the questions or provide a demonstration or an example report of the questions asked then the requester would definitely be wasting money.

The technical inspection

TSCM inspections are conducted after hours or over weekends to minimise disruptions and disturbances to business operations. Depending on the circumstances and the perceived threat some surveys have to be conducted during business hours and during the times when actual meetings and discussions are taking place.

Attacks on information can occur on various levels and the TSCM team will have to do different types of technical, electronic and physical inspections to determine if information is captured in and how it is leaving the area Information can be captured and transmitted via audio, video and optical devices.

As a minimum, the TSCM service provider should conduct the following category of tests:

• Radio frequency scan – a search for surveillance devices that transmit information via radio frequencies (RF). The analysis should cover the spectrum up to about 10 GHz. The service provider should create maps and signal lists of all energy captured and investigated. It is important that the scans are done and recorded inside and outside of the facility;

• Telephone and communication tests – various tests are performed to test telephone instruments, telephone lines, telephone and server closets, audio and video conferencing systems and other cables in the survey area(s);

• Physical inspection – physical checks of the ceiling areas, electrical plugs, sockets, light switches, crawl spaces, under-floor cavities and openings with a variety of equipment. TSCM equipment aiding in the physical inspection is a Non-Linear Junction Detector (NLJD), a thermal imaging camera, optical devices and a good quality TSCM inspection tool kit;

• Cyber/IT TSCM tests – Wi-Fi, Bluetooth and GSM networks are scanned for unknown or rogue devices that could utilise these communication mediums as conduits to get information out of sensitive areas. Logical information has to be provided along with technical information, maps, locations and devices connected.

On completion of the survey the TSCM service provider should provide a verbal report of the findings of the survey followed by a detailed written report. The written report should be a clear and concise record of the work that the TSCM service provider performed. Important is the description of the areas investigated, the inspection methodology, the equipment and procedures employed, the findings, observations and recommendations, other information security weaknesses uncovered and observed, recommendations, photographs and other supporting material.

TSCM Questions

If you are serious to get the best TSCM service provider for your organisation then there are a few basic questions to ask before engaging with a service provider:

1. Do they investigate the GSM networks for covert surveillance devices? GSM voice channels support eight calls all hopping around each other and without the ability to provide logical information, the under-equipped service provider is in trouble.

2. Do they investigate the Wi-Fi and Bluetooth networks for covert surveillance devices? Can the service provider identify active Wi-Fi channels, recover MAC addresses from the packets, identify send and receive addresses, identify radio manufacturers, SSID, etc.?

3. Do they conduct a full thermal spectral analysis? Scans should be done with a thermal imager to discover and to locate devices in ceilings, walls, artifacts, etc., without damaging the objects?

4. Do they conduct a full mains sub-carrier scan and provide a list of the signals investigated? Power line and carrier current bugs up to 40 MHz.

5. Do they provide RF maps and a signal list of all RF activity investigated?

6. Do they provide pinpoint direction finding of all localised transmissions?

7. Is frequency domain reflectometry conducted on all cables, IT ancillaries and data networks?

8. Do they provide testing on all type of telephones (including VoIP) and cables with a full technical report?

9. Other questions to ask could be regarding proof of training, industry affiliations, equipment utilised, references, etc.

Steve Whitehead is the Managing Member of Eavesdropping Detection Solutions (EDS) and a board member of the Espionage Research Institute International (ERII) headquartered in Washington D.C., USA. (www.erii.org) ERII is a TSCM, counterespionage and cyber counterintelligence association. For more information, visit www.tscm-za.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Unlocking new efficiencies in private security
Security Services & Risk Management Transport (Industry) Smart Home Automation Logistics (Industry)
Justin Manson, Sales Director at Webfleet, discusses how the urgent need to protect life, and to do so more efficiently, is driving continuous innovation in holistic home and residential security services in South Africa.

Read more...
Innovation and security go hand in hand
Technews Publishing Facilities & Building Management Security Services & Risk Management
In a world where the demand for tech innovation is matched only by the acceleration of cybersecurity threats, businesses face the challenge of balancing new product development and robust security measures.

Read more...
Bomb threat landscape in South Africa
Editor's Choice Security Services & Risk Management
Over the past 25 years, South Africa has faced thousands of bomb threats and explosive incidents annually, imposing a significant economic burden on the nation, costing billions of rand.

Read more...
Natural catastrophes and fire risks top concerns
Security Services & Risk Management Asset Management Residential Estate (Industry)
Natural disasters are the highest risk in the real estate industry, followed by fire and explosions, and then business interruption. Estates must prioritise risk management and take proactive measures to safeguard their assets, employees, and reputation.

Read more...
Building a solid foundation
Alwinco Security Services & Risk Management Asset Management Residential Estate (Industry)
Understanding the roles of a Risk Assessor and a Risk Manager is like building a solid and secure foundation in the security world. Andre Mundell makes it easy to understand.

Read more...