In previous articles, we discussed how lines sometimes blur between cyber security and TSCM, where skills from both disciplines may be needed to identify threats. Here’s a recent example that illustrates this, where transmitters and receivers can be used to initiate a cyber attack.

There are USB cables that can be controlled remotely via wireless/bluetooth to inject a payload with command line/keystrokes onto a computer. The computer can be remote controlled, accessing networks, files, control settings, permissions, or a critical information. It could also be used to inject a virus. Continue reading “USB Cables Can Hide A New Payload Threat”

GSM stands for Global System for Mobile communication and is a standard digital cellular network used in Europe and much of the world. GSM phones use removable SIM cards (Subscriber Identity Module) containing network access configurations. A GSM bug is a wireless listening device fitted with a SIM card using the GSM network, and can be accessed and controlled anywhere by a telephone call. GSM bugs can be concealed in common consumer products, appliances, electronic accessories, lamps, preferably items with access to unlimited power, but can also be battery powered. Reasons they are common: Continue reading “What is a GSM Bug?”

Is your company evaluating how to protect its intellectual assets? An IBM-sponsored study reports that the average cost of a data breach is $3.62 million and the average size of data breaches is on the rise. Today’s existing internet and mobile phone networks serve as digital listening posts anywhere in the world. There are more frequent occurrences where technical security vulnerabilities are opening the door to cybersecurity threats:

Continue reading “When TSCM and Cybersecurity Collide”

The Threat:

Arguably one of the biggest threats of confidential conversations leaving a room or area of a facility is the ordinary loudspeaker or well-shielded microphone. When conducting a proper TSCM investigation, it is important to inspect all building wiring to ensure that no conductors are being used to transport stolen audio or video information. It is fairly simple for someone to attach a microphone to any two existing conductors present in an area and pass audio through a speaker “down the line” to be received elsewhere.

Continue reading “Are You Being Overheard?”


The previous installment in this series discussed analog telephone threats commonly overlooked in business environments. In this second installment, focus is directed to digital and VoIP phone system threats. While threats like packet capture of VoIP traffic may be obvious, we are going to highlight some less-complicated threats that are easily addressed, providing a large security benefit.

Continue reading “Is Telecom Security Still A Concern? – Part Two”