In previous articles, we discussed how lines sometimes blur between cyber security and TSCM, where skills from both disciplines may be needed to identify threats. Here’s a recent example that illustrates this, where transmitters and receivers can be used to initiate a cyber attack.

There are USB cables that can be controlled remotely via wireless/bluetooth to inject a payload with command line/keystrokes onto a computer. The computer can be remote controlled, accessing networks, files, control settings, permissions, or a critical information. It could also be used to inject a virus. Continue reading “USB Cables Can Hide A New Payload Threat”

Protecting meeting spaces from illicit eavesdropping is a growing necessity. Start by ensuring there are no devices located inside the room itself, whether hidden or visible, that could be compromised for illicit purposes. Some examples of devices are desk phones, mobile phones, or audio recorders hidden in furniture or everyday items. Another threat that must not be neglected is audio leakage from surrounding surfaces and adjacent offices. These are vulnerabilities for both those listening in on your meeting with illicit intent or the passive observer in an adjacent office. Continue reading “Protecting Conversations With Noise Masking”

GSM stands for Global System for Mobile communication and is a standard digital cellular network used in Europe and much of the world. GSM phones use removable SIM cards (Subscriber Identity Module) containing network access configurations. A GSM bug is a wireless listening device fitted with a SIM card using the GSM network, and can be accessed and controlled anywhere by a telephone call. GSM bugs can be concealed in common consumer products, appliances, electronic accessories, lamps, preferably items with access to unlimited power, but can also be battery powered. Reasons they are common: Continue reading “What is a GSM Bug?”

The newly-launched ANDRE Advanced Near-field Detection Receiver from Research Electronics International is helping prevent fraud at exam testing sites. Commonly used for counter surveillance operations and intelligence protection, the ANDRE is now also helping educators prevent cheating during examinations by detecting covert electronic transmissions.

According to news reports out of Brazil*, eleven individuals were arrested last year for using electronic devices during the high-profile National High School Examination (ENEM). This year, the Ministry of Education will be using ANDRE to locate and identify participants who attempt to use electronic devices during the exam and may have circumvented inspection by metal detectors.

Continue reading “Preventing Fraud at Exam Testing Sites Using the ANDRE”

ANDRE Advanced Near-field Detection Receiver Front ViewThe newly-launched ANDRE Advanced Near-field Detection Receiver from Research Electronics International is helping prevent fraud at exam testing sites. Originally designed for counter surveillance operations and intelligence protection, the ANDRE is now also helping educators prevent cheating during examinations by detecting covert electronic transmissions.

According to news reports out of Brazil*, eleven individuals were arrested last year for using electronic devices during the high-profile National High School Examination (Enem). This year, the Ministry of Education will be using ANDRE to locate and identify participants who attempt to use electronic devices during the exam who may have circumvented inspection by metal detectors.

Continue reading “Preventing Fraud at Exam Testing Sites using the ANDRE Advanced Near-field Detection Receiver”

Is your company evaluating how to protect its intellectual assets? An IBM-sponsored study reports that the average cost of a data breach is $3.62 million and the average size of data breaches is on the rise. Today’s existing internet and mobile phone networks serve as digital listening posts anywhere in the world. There are more frequent occurrences where technical security vulnerabilities are opening the door to cybersecurity threats:

Continue reading “When TSCM and Cybersecurity Collide”

The Threat:

Arguably one of the biggest threats of confidential conversations leaving a room or area of a facility is the ordinary loudspeaker or well-shielded microphone. When conducting a proper TSCM investigation, it is important to inspect all building wiring to ensure that no conductors are being used to transport stolen audio or video information. It is fairly simple for someone to attach a microphone to any two existing conductors present in an area and pass audio through a speaker “down the line” to be received elsewhere.

Continue reading “Are You Being Overheard?”

Telecom-Banner

The previous installment in this series discussed analog telephone threats commonly overlooked in business environments. In this second installment, focus is directed to digital and VoIP phone system threats. While threats like packet capture of VoIP traffic may be obvious, we are going to highlight some less-complicated threats that are easily addressed, providing a large security benefit.

Continue reading “Is Telecom Security Still A Concern? – Part Two”