Return to flip book view

TSCM / Bugsweep

Page 1

TSCM TECHNICAL SURVEILLANCE COUNTER MEASURES XTREME SECURITY and ASSOCIATES info xtremesecurity eu www xtremesecurity eu

Page 2

welcome Table of CONTENT S It is crucial to protect your sensitive business information from theft in advance Introduction to TSCM INTRODUCTION TO TSCM What is TSCM 03 More on TSCM experts 04 Services offered by TSCM experts 04 Preliminary inquires 05 The scope of work covered during a sweep 08 Adjust the test to threat level 09 Our methododitacl approach 10 Studies conducted among business entities around the world reveal a frightening surge in corporate industrial and economic espionage activities regardless of business All of these are essentially different from those related to competitive intelligence a field that involves the use of ethical legal and hygienic means for the systematic collection analysis and comparison of information about competing business entities The trouble is that a business factor often discovers too late and in its flesh the difference Given current and well known scenarios it is crucial to protect your sensitive business information from theft in advance In other words it is very important to conduct periodic inspections of your business offices development centers meeting rooms and meetings And these should be performed exclusively through recognized and proven TSCM experts Services Vehicle Search 12 Super yachts 12 Aircraft electronic 13 Products Counter surveilance 14 Intelligence gathering 17 What is TSCM TSCM is a process carried out by experienced and well known experts who are responsible for providing a wide range of services including detection and destroying devices that have been illegally installed to steal sensitive business information or for many other different reasons without knowladge of the person who was under surveillance The business organisation as the target of competitors 20 TSCM XTREME SECURITY The trouble is that a business factor often discovers too late and in its flesh the difference

Page 3

welcome Table of CONTENT S It is crucial to protect your sensitive business information from theft in advance Introduction to TSCM INTRODUCTION TO TSCM What is TSCM 03 More on TSCM experts 04 Services offered by TSCM experts 04 Preliminary inquires 05 The scope of work covered during a sweep 08 Adjust the test to threat level 09 Our methododitacl approach 10 Studies conducted among business entities around the world reveal a frightening surge in corporate industrial and economic espionage activities regardless of business All of these are essentially different from those related to competitive intelligence a field that involves the use of ethical legal and hygienic means for the systematic collection analysis and comparison of information about competing business entities The trouble is that a business factor often discovers too late and in its flesh the difference Given current and well known scenarios it is crucial to protect your sensitive business information from theft in advance In other words it is very important to conduct periodic inspections of your business offices development centers meeting rooms and meetings And these should be performed exclusively through recognized and proven TSCM experts Services Vehicle Search 12 Super yachts 12 Aircraft electronic 13 Products Counter surveilance 14 Intelligence gathering 17 What is TSCM TSCM is a process carried out by experienced and well known experts who are responsible for providing a wide range of services including detection and destroying devices that have been illegally installed to steal sensitive business information or for many other different reasons without knowladge of the person who was under surveillance The business organisation as the target of competitors 20 TSCM XTREME SECURITY The trouble is that a business factor often discovers too late and in its flesh the difference

Page 4

SERVICE OFFERED BY TSCM EXPERTS TSCM experts offer a range of linked services including the whole process These services include pre research monitoring surveys post detection and others All these are provided to the customer in a manner that matches his specific needs The TSCM task tends to be complex and therefore time consuming if it involves extensive investigation into a large facility which generally requires the hiring of a large team of experts A typical TSCM team of experts will typically be equipped with a winning methodology for a comprehensive performance of each task from a secure initiating session with a client continued testing and vulnerability analysis and various preventive actions MORE ON TSCM EXPERTS The expert TSCM team will be equipped as a rule with many up to date equipment tools and technologies that excel in a wide range of features and functions to perform effective testing processes Many of these are available today in the free market in low and high prices All this does not necessarily mean that anyone with such tools and tools can perform tasks in the TSCM field with the same degree of success as recognized experts in the field A proven professional supplier of TSCM services has as a rule undergone many stages of training in tracking detecting and neutralizing eavesdropping detection and neutralization factors without the object of these actions being felt In addition professional execution of TSCM tasks requires control of knowledge areas such as radio frequency electricity computing fixed and mobile telephony and many more TSCM specialistsMust be creative calculated and sensitive to detail in order to meet all the basic criteria for the success of a TSCM investigation What distinguishes them from other researchers is their ability to discern things that are not likely to attract the attention of the latter and later to investigate them in a way that directly serves the overall investigative effort TSCM info xtremesecurity eu www xtremesecurity eu 5

Page 5

SERVICE OFFERED BY TSCM EXPERTS TSCM experts offer a range of linked services including the whole process These services include pre research monitoring surveys post detection and others All these are provided to the customer in a manner that matches his specific needs The TSCM task tends to be complex and therefore time consuming if it involves extensive investigation into a large facility which generally requires the hiring of a large team of experts A typical TSCM team of experts will typically be equipped with a winning methodology for a comprehensive performance of each task from a secure initiating session with a client continued testing and vulnerability analysis and various preventive actions MORE ON TSCM EXPERTS The expert TSCM team will be equipped as a rule with many up to date equipment tools and technologies that excel in a wide range of features and functions to perform effective testing processes Many of these are available today in the free market in low and high prices All this does not necessarily mean that anyone with such tools and tools can perform tasks in the TSCM field with the same degree of success as recognized experts in the field A proven professional supplier of TSCM services has as a rule undergone many stages of training in tracking detecting and neutralizing eavesdropping detection and neutralization factors without the object of these actions being felt In addition professional execution of TSCM tasks requires control of knowledge areas such as radio frequency electricity computing fixed and mobile telephony and many more TSCM specialistsMust be creative calculated and sensitive to detail in order to meet all the basic criteria for the success of a TSCM investigation What distinguishes them from other researchers is their ability to discern things that are not likely to attract the attention of the latter and later to investigate them in a way that directly serves the overall investigative effort TSCM info xtremesecurity eu www xtremesecurity eu 5

Page 6

PRELIMINARY INQUIRES Because there are various kinds of technical monitoring and espionage devices operating in different technologies the test equipment must have the appropriate capability to identify and locate the same methods and the testing operations should have extensive technical knowledge and technical expertise on how to detect millimeter and millimeter at the site being examined With regard to vocational training it is desirable that the test operation be technically trained in the field of communication and in the field of non ionizing RF radiation tests which are very important in the TSCM test TSCM testing involves intensive activity that requires concentration of thought and considerable physical activity and therefore even in relatively small places it is desirable that the test be carried out at The first clarification you must make is least by a team of two testers regarding the identity of the supplier and his professional training The second clarification we recommend It is important to know who you invite is regarding the type of equipment in to enter your intimate fortress It should which the supplier intends to perform the be noted that during the test the test test operations will be accessible to every In order for you to assess for yourself the seriousness of a TSCM supplier we recommend that you make a number of preliminary inquiries that are Essential equipment for TSCM testing 1 Spectrum analyzer Low frequency VLF LF mediumhigh definition MLF HF an ultra high frequency spectrum SHF 2 NLJD Special equipment for TSCM teams is used to detect semiconductor components even when they are off 3 TDR equipment that enables the diagnosis of communication lines against a serial and parallel listening device 4 Power measure magnetic field The field magnetic field strength meter 5 Electromagnetic power meter The electromagnetic field strength meter in the nearest field 6 CATCHER IMEI system for detecting GSM transmitters in STANDBY mode 7 Thermal Camera A utility that allows efficient detection of heat sources In our opinion each professional TSCM team will cooperate with you and will respond to your questions After the initial screening and debugging we recommend moving to the next step and the technical specifications Ask the supplier for technical specifications of all test areas And when this information is available to you we will be able to better evaluate the offers you will receive 6 TSCM info xtremesecurity eu www xtremesecurity eu TSCM info xtremesecurity eu www xtremesecurity eu 7

Page 7

PRELIMINARY INQUIRES Because there are various kinds of technical monitoring and espionage devices operating in different technologies the test equipment must have the appropriate capability to identify and locate the same methods and the testing operations should have extensive technical knowledge and technical expertise on how to detect millimeter and millimeter at the site being examined With regard to vocational training it is desirable that the test operation be technically trained in the field of communication and in the field of non ionizing RF radiation tests which are very important in the TSCM test TSCM testing involves intensive activity that requires concentration of thought and considerable physical activity and therefore even in relatively small places it is desirable that the test be carried out at The first clarification you must make is least by a team of two testers regarding the identity of the supplier and his professional training The second clarification we recommend It is important to know who you invite is regarding the type of equipment in to enter your intimate fortress It should which the supplier intends to perform the be noted that during the test the test test operations will be accessible to every In order for you to assess for yourself the seriousness of a TSCM supplier we recommend that you make a number of preliminary inquiries that are Essential equipment for TSCM testing 1 Spectrum analyzer Low frequency VLF LF mediumhigh definition MLF HF an ultra high frequency spectrum SHF 2 NLJD Special equipment for TSCM teams is used to detect semiconductor components even when they are off 3 TDR equipment that enables the diagnosis of communication lines against a serial and parallel listening device 4 Power measure magnetic field The field magnetic field strength meter 5 Electromagnetic power meter The electromagnetic field strength meter in the nearest field 6 CATCHER IMEI system for detecting GSM transmitters in STANDBY mode 7 Thermal Camera A utility that allows efficient detection of heat sources In our opinion each professional TSCM team will cooperate with you and will respond to your questions After the initial screening and debugging we recommend moving to the next step and the technical specifications Ask the supplier for technical specifications of all test areas And when this information is available to you we will be able to better evaluate the offers you will receive 6 TSCM info xtremesecurity eu www xtremesecurity eu TSCM info xtremesecurity eu www xtremesecurity eu 7

Page 8

THE SCOPE OF WORK COVERED DURING A SWEEP The sweep would start with a technical and physical search of the property perimeter searching for hidden cameras and GSM interceptors being within the locus Then we would enter the property and initiate a full spectrum scan comparing signals from outside the property with signals within the property using a Nato Equiplane antenna attached to a spectrum analyser with this we will also RF map each room of the sweep whilst doing this we will also undertake and overlap the following search methods Broadband locate near field transmissions within the room Use of thermal analysis on the walls and ceiling to locate devices X Ray any objects to search for hidden integrations Use UV light technology to search for indiscretions on paint work and dust Wi Fi analyse of each room Physically search each room including removing lighting and electrical fittings Insert video scopes into the wall and ceiling voids non destructively to search for devices Use laser diodes to search for wireless camera lenses We will search for hard wired cameras using electromagnetic detectors Using high power laser we will search for fibre optic microphones Bluetooth and DECT analysis to search for parasitic devices Use infrared technology to scan windows for infrared and laser microphone attack Check for sub carriers on the electrical lines Check for devices on the telephone lines Search for GSM interceptors Some companies offer cheap TSCM services whose prices are a fraction of those required by well known and reputable suppliers but these services prove to be ineffective in retrospect since service providers lack the necessary training and professional experience Adjust the test to threat level Low level threats require search by electronic equipment for video video and subject matter and visual inspection of telephone lines including MDF IDF and Krone Blocks including those adjacent to the building being inspected from outside or linked to its infrastructure In these cases it is customary to perform a rapid and basic examination A low level threat concerns private and personal information usually related to family matters Its implementation may result in targeted frequency radio scanning monitoring interception of calls made by wireless telephone devices and so forth Medium level threats require electronic equipment to search for audio and video broadcast media wired audio and video devices and subject currents as well as physical analysis of telephony from the outside box adjacent to the building to all communication nodes In addition it is customary to perform a comprehensive physical and visual 8 TSCM info xtremesecurity eu www xtremesecurity eu examination of the building and its surroundings including electrical outlets switches and any other item that may be considered a potential threat A medium level threat concerns confidential and sensitive information relating to sales and marketing lawyers disgruntled employees union issues cases of harassment and illegal surveillance privacy intrusion and monitoring in private investigations High level threats require years of comprehensive and ongoing training and handling them can involve up to half a million dollars in appropriate professional equipment This level of TSCM services is usually provided by former intelligence agents A high level threat requires the identification of all types of means including the most advanced eavesdropping equipment installed by government officials to spy on elements connected with other governments TSCM info xtremesecurity eu www xtremesecurity eu 9

Page 9

THE SCOPE OF WORK COVERED DURING A SWEEP The sweep would start with a technical and physical search of the property perimeter searching for hidden cameras and GSM interceptors being within the locus Then we would enter the property and initiate a full spectrum scan comparing signals from outside the property with signals within the property using a Nato Equiplane antenna attached to a spectrum analyser with this we will also RF map each room of the sweep whilst doing this we will also undertake and overlap the following search methods Broadband locate near field transmissions within the room Use of thermal analysis on the walls and ceiling to locate devices X Ray any objects to search for hidden integrations Use UV light technology to search for indiscretions on paint work and dust Wi Fi analyse of each room Physically search each room including removing lighting and electrical fittings Insert video scopes into the wall and ceiling voids non destructively to search for devices Use laser diodes to search for wireless camera lenses We will search for hard wired cameras using electromagnetic detectors Using high power laser we will search for fibre optic microphones Bluetooth and DECT analysis to search for parasitic devices Use infrared technology to scan windows for infrared and laser microphone attack Check for sub carriers on the electrical lines Check for devices on the telephone lines Search for GSM interceptors Some companies offer cheap TSCM services whose prices are a fraction of those required by well known and reputable suppliers but these services prove to be ineffective in retrospect since service providers lack the necessary training and professional experience Adjust the test to threat level Low level threats require search by electronic equipment for video video and subject matter and visual inspection of telephone lines including MDF IDF and Krone Blocks including those adjacent to the building being inspected from outside or linked to its infrastructure In these cases it is customary to perform a rapid and basic examination A low level threat concerns private and personal information usually related to family matters Its implementation may result in targeted frequency radio scanning monitoring interception of calls made by wireless telephone devices and so forth Medium level threats require electronic equipment to search for audio and video broadcast media wired audio and video devices and subject currents as well as physical analysis of telephony from the outside box adjacent to the building to all communication nodes In addition it is customary to perform a comprehensive physical and visual 8 TSCM info xtremesecurity eu www xtremesecurity eu examination of the building and its surroundings including electrical outlets switches and any other item that may be considered a potential threat A medium level threat concerns confidential and sensitive information relating to sales and marketing lawyers disgruntled employees union issues cases of harassment and illegal surveillance privacy intrusion and monitoring in private investigations High level threats require years of comprehensive and ongoing training and handling them can involve up to half a million dollars in appropriate professional equipment This level of TSCM services is usually provided by former intelligence agents A high level threat requires the identification of all types of means including the most advanced eavesdropping equipment installed by government officials to spy on elements connected with other governments TSCM info xtremesecurity eu www xtremesecurity eu 9

Page 10

Protect Information A high level threat requires the full attention of the antitrust expert to countermeasures and it is expected that this will be required for the full breadth of his knowledge in the field and most of the work required in this case will be done by professionals working for military intelligence or directly with government officials professional experience On the other hand there are companies that require for the same level of ineffective service exorbitant prices Such factors will give you a false sense of technical security The investigation of a professional and responsible officer on the other hand is expected to be tedious and time consuming Consulting a TSCM service provider will allow you to decide what level of threat you pose or whether such a threat exists You must remember that an effective and rigorous TSCM investigation requires many years of dedicated technical training appropriate certifications and rich professional experience It is important to choose your TSCM expert based on an up to date list of the equipment and the equipment he or she uses In cases of high level threats it is necessary first and foremost to strictly protect classified information relating to issues such as national security diplomatic missions and government and law enforcement agencies Furthermore a great deal of discretion will be required as to the nature of the TSCM investigation to be conducted as well as the selection of the service provider most appropriate for its implementation Some companies offer cheap TSCM services whose prices are a fraction of those required by well known and reputable suppliers but these services prove to be ineffective in retrospect since service providers lack the necessary training and As with any other case of using a professional service you should acquire a good basic TSCM knowledge before you decide to entrust your safety to one or another service provider Our methododitacl approach Test TSCM as far as another test of all researched area in our lives must give an adequate response to the nature and type of phenomenon being studied in this case the phenomenon under investigation is finding a technological measure used by the opponents of espionage In order for the test to be effective it must meet the test of two basic conditions validity and reliability The relevance of their research tools and their use in studying the phenomenon under study The degree of stability of the measurement results

Page 11

Protect Information A high level threat requires the full attention of the antitrust expert to countermeasures and it is expected that this will be required for the full breadth of his knowledge in the field and most of the work required in this case will be done by professionals working for military intelligence or directly with government officials professional experience On the other hand there are companies that require for the same level of ineffective service exorbitant prices Such factors will give you a false sense of technical security The investigation of a professional and responsible officer on the other hand is expected to be tedious and time consuming Consulting a TSCM service provider will allow you to decide what level of threat you pose or whether such a threat exists You must remember that an effective and rigorous TSCM investigation requires many years of dedicated technical training appropriate certifications and rich professional experience It is important to choose your TSCM expert based on an up to date list of the equipment and the equipment he or she uses In cases of high level threats it is necessary first and foremost to strictly protect classified information relating to issues such as national security diplomatic missions and government and law enforcement agencies Furthermore a great deal of discretion will be required as to the nature of the TSCM investigation to be conducted as well as the selection of the service provider most appropriate for its implementation Some companies offer cheap TSCM services whose prices are a fraction of those required by well known and reputable suppliers but these services prove to be ineffective in retrospect since service providers lack the necessary training and As with any other case of using a professional service you should acquire a good basic TSCM knowledge before you decide to entrust your safety to one or another service provider Our methododitacl approach Test TSCM as far as another test of all researched area in our lives must give an adequate response to the nature and type of phenomenon being studied in this case the phenomenon under investigation is finding a technological measure used by the opponents of espionage In order for the test to be effective it must meet the test of two basic conditions validity and reliability The relevance of their research tools and their use in studying the phenomenon under study The degree of stability of the measurement results

Page 12

OUR SERVICE S VEHICLE SEARCH SUPERYACHT SWEEP AIRCRAFT ELECTRNIC COUNTERMEASURE SEARCHES VEHICLE SEARCH We offer an extended security inspection service for executive vehicles We can conduct a professional TSCM inspection of executive vehicles prior to or during times of important or confidential business activity We also offer a consultation service with a focus upon the physical and operating security arrangements in use around corporate vehicles Our team are specialists in the area of vehicle search drawing from experience and expertise in automotive electrical and radio engineering Our personnel have extensive experience in the fields of covert surveillance and tracking The types of technology methods of deployment and restrictions of surveillance equipment vary greatly between different types of vehicle and location We fully understand all these conditions and can draw on their unparalleled experience to deliver a proportional and professional vehicle search service Our aim is to protect your communications from unauthorised access or compromise whilst using executivetransport to conduct confidential meetings We are fully insured and our operatives and equipment meet all relevant international obligations and requirements to enable safe and secure communications in any road going vehicle in any global location SUPER YACHTS The Super Yacht industry has dramatically increased over the last few years More owners are cruising globally and on occasions may cruise through high risk areas where communications may be vulnerable to unauthorised access attempts Today s yacht is a very high specification vessel fitted with the latest integrated technical systems One of the many invaluable services offered by Our Consultants is specifically designed to support the owners of yachts yacht management and chartering companies and relevant crew and personnel services companies from conception to commissioning of the yacht through to meeting the confidential commercial and operational requirements whilst the yacht is at sea 12 TSCM info xtremesecurity eu www xtremesecurity eu AIRCRAFT ELECTRONIC COUNTERMEASURE SEARCHES Our consultants sweep team carry out comprehensive technical surveillance counter measure TSCM searches specifically geared for corporate aircraft Corporate aircraft of all sizes are frequently used as mobile offices and meeting rooms when airborne or static on the ground often at low profile airfields with little or no effective security In addition many corporate aircraft are chartered or leased In this regard these aircraft and environments are vulnerable to the placing of electronic eavesdropping equipment that can be disguised as normal electronic and avionic equipment Technical Protection has the experience and knowhow to carry out specialised searches on an extensive range of corporate aircraft including Bombardier Global Express all models Bombardier Challenger 602 604 Bombardier Lear 45 Gulfstream G4 G4SP G5 Hawker 800 800XP Dassault Falcon 2000 Dassault Falcon 7X Boeing Business Jet BBJ BBJ2 Airbus Corporate Jetliner Cessna Citation 10 Excel Using state of the art equipment we carry out searches for conventional and non conventional eavesdropping devices including those using digital transmission mediums and modern GSM based devices We also search for covert digital audio and video recording systems which may become active when the aircraft is airborne TSCM info xtremesecurity eu www xtremesecurity eu 13

Page 13

OUR SERVICE S VEHICLE SEARCH SUPERYACHT SWEEP AIRCRAFT ELECTRNIC COUNTERMEASURE SEARCHES VEHICLE SEARCH We offer an extended security inspection service for executive vehicles We can conduct a professional TSCM inspection of executive vehicles prior to or during times of important or confidential business activity We also offer a consultation service with a focus upon the physical and operating security arrangements in use around corporate vehicles Our team are specialists in the area of vehicle search drawing from experience and expertise in automotive electrical and radio engineering Our personnel have extensive experience in the fields of covert surveillance and tracking The types of technology methods of deployment and restrictions of surveillance equipment vary greatly between different types of vehicle and location We fully understand all these conditions and can draw on their unparalleled experience to deliver a proportional and professional vehicle search service Our aim is to protect your communications from unauthorised access or compromise whilst using executivetransport to conduct confidential meetings We are fully insured and our operatives and equipment meet all relevant international obligations and requirements to enable safe and secure communications in any road going vehicle in any global location SUPER YACHTS The Super Yacht industry has dramatically increased over the last few years More owners are cruising globally and on occasions may cruise through high risk areas where communications may be vulnerable to unauthorised access attempts Today s yacht is a very high specification vessel fitted with the latest integrated technical systems One of the many invaluable services offered by Our Consultants is specifically designed to support the owners of yachts yacht management and chartering companies and relevant crew and personnel services companies from conception to commissioning of the yacht through to meeting the confidential commercial and operational requirements whilst the yacht is at sea 12 TSCM info xtremesecurity eu www xtremesecurity eu AIRCRAFT ELECTRONIC COUNTERMEASURE SEARCHES Our consultants sweep team carry out comprehensive technical surveillance counter measure TSCM searches specifically geared for corporate aircraft Corporate aircraft of all sizes are frequently used as mobile offices and meeting rooms when airborne or static on the ground often at low profile airfields with little or no effective security In addition many corporate aircraft are chartered or leased In this regard these aircraft and environments are vulnerable to the placing of electronic eavesdropping equipment that can be disguised as normal electronic and avionic equipment Technical Protection has the experience and knowhow to carry out specialised searches on an extensive range of corporate aircraft including Bombardier Global Express all models Bombardier Challenger 602 604 Bombardier Lear 45 Gulfstream G4 G4SP G5 Hawker 800 800XP Dassault Falcon 2000 Dassault Falcon 7X Boeing Business Jet BBJ BBJ2 Airbus Corporate Jetliner Cessna Citation 10 Excel Using state of the art equipment we carry out searches for conventional and non conventional eavesdropping devices including those using digital transmission mediums and modern GSM based devices We also search for covert digital audio and video recording systems which may become active when the aircraft is airborne TSCM info xtremesecurity eu www xtremesecurity eu 13

Page 14

PRODUCTS COUNTER SURVEILANCE Hand held Jammer Desktop held Jammer GSM Investigtion Device Encrypted Mobile Phones Encrypted Laptops Untraceable Mobilephone SIM cards HAND HELD JAMMER BLOCKER Many intelligence gathering organisations use GSM Bluetooth and Wi Fi and GPS tracking bugging devices to gather information the MJ01 is a piece of equipment that will block and jam the transmissions being made by these devices the MJ01 is battery operated and can be kept in a coat pocket or bag DESKTOP JAMMER BLOCKER Many intelligence gathering organisations use GSM Bluetooth and Wi Fi and GPS tracking bugging devices to gather information the MJ01 is a piece of equipment that will block and jam the transmissions being made by these devices the MJ01 can also be used in homes offices or a vehicle powered through the 12v in car charger MOBILE DETECTION SYSTEM PHOENIX The equipment will acquire the IMEI and IMSI numbers of the target GSM engine device in its coverage area then you can block the target number if needed disabling its dialling receiving calls sending or receiving messages This equipment can be used during searches of buildings or vehicles capturing GSM devices giving results instantly reducing the time spent on sweeps The software runs a white list that enables all known numbers can be kept on during the sweep the equipment will Alarm when numbers not in the List are detected All record data can be exported in EXCEL format HELIX SECURE MOBILE PHONE The Helix Secure phone is the most advanced secure phone on the market not only is the end to end communication encryption at the highest the phone makers have focused on the actual encryption and security of the phone removing the operating system and replacing with their own platform protecting your information if lost or stolen These phones are ready to use anywhere in the world thanks to the world wide data sim and have no down time so you are always in communication reach Please note to use the encrypted messaging and voice calls you have to be contacting another Helix phone but the PGP system is a full white list system and can contact any PGP provider Fully encrypted operating system Encrypted instant messaging closed system PGP emailing Encrypted secure voice calls All normal features disable example calls GPS tests Panic code feature wipes phone once entered Once wiped its gone forever forensic report available to certify 6 month unlimited worldwide data sim Encrypted notes License app see when due to renew JAMMER 14 TSCM info xtremesecurity eu www xtremesecurity eu TSCM info xtremesecurity eu www xtremesecurity eu 15

Page 15

PRODUCTS COUNTER SURVEILANCE Hand held Jammer Desktop held Jammer GSM Investigtion Device Encrypted Mobile Phones Encrypted Laptops Untraceable Mobilephone SIM cards HAND HELD JAMMER BLOCKER Many intelligence gathering organisations use GSM Bluetooth and Wi Fi and GPS tracking bugging devices to gather information the MJ01 is a piece of equipment that will block and jam the transmissions being made by these devices the MJ01 is battery operated and can be kept in a coat pocket or bag DESKTOP JAMMER BLOCKER Many intelligence gathering organisations use GSM Bluetooth and Wi Fi and GPS tracking bugging devices to gather information the MJ01 is a piece of equipment that will block and jam the transmissions being made by these devices the MJ01 can also be used in homes offices or a vehicle powered through the 12v in car charger MOBILE DETECTION SYSTEM PHOENIX The equipment will acquire the IMEI and IMSI numbers of the target GSM engine device in its coverage area then you can block the target number if needed disabling its dialling receiving calls sending or receiving messages This equipment can be used during searches of buildings or vehicles capturing GSM devices giving results instantly reducing the time spent on sweeps The software runs a white list that enables all known numbers can be kept on during the sweep the equipment will Alarm when numbers not in the List are detected All record data can be exported in EXCEL format HELIX SECURE MOBILE PHONE The Helix Secure phone is the most advanced secure phone on the market not only is the end to end communication encryption at the highest the phone makers have focused on the actual encryption and security of the phone removing the operating system and replacing with their own platform protecting your information if lost or stolen These phones are ready to use anywhere in the world thanks to the world wide data sim and have no down time so you are always in communication reach Please note to use the encrypted messaging and voice calls you have to be contacting another Helix phone but the PGP system is a full white list system and can contact any PGP provider Fully encrypted operating system Encrypted instant messaging closed system PGP emailing Encrypted secure voice calls All normal features disable example calls GPS tests Panic code feature wipes phone once entered Once wiped its gone forever forensic report available to certify 6 month unlimited worldwide data sim Encrypted notes License app see when due to renew JAMMER 14 TSCM info xtremesecurity eu www xtremesecurity eu TSCM info xtremesecurity eu www xtremesecurity eu 15

Page 16

Total Encrypted HELIX LAPTOP SYSTEM Helix Laptop system is a completely secure encrypted mobile work station which keeps your data and communications completely private A slim line lightweight option featuring a fully encrypted SSD hard disk with a custom Linux operating system This range is tailor made for the corporate sector and private individuals who prefer a discreet look for their secure device Our development team have stripped out the standard hard drive from the HP Elite Book and replaced it with an SSD hard disk allowing for a silent and faster performance Our notebook comes with a THREE password entry process to protect your data and files Utilizing a Linux based operating system which has been fully customized to allow clients to use straight out the box with all settings and programs you could ever need already installed With a 5th Gen Intel Core processors that yield impressive speed and performance Power through your day with extra battery life when using the optional long life slice battery built with professionals in mind Our laptops come complete with a fully secure VPN connection FEATURES FIPS 140 2 Level 3 Certified Certificate No 1873 FIPS PUB 197 Validated Encryption Algorithm Real time military grade CBC AES 256 bit hardware Hardware and Software Tightened Brute Force Hack Defense Mechanism Fully Encrypted SSD Hard Drive Crypto parameters protected with SHA 256 hashing Three password start up process Preloaded with easy to use encryption software Custom secure MPC VPN included Subscription Renewal Required Pre configured Internet and software settings hardened for security PRODUCTS INTELLIGENCE GATHERING INTERGRATIONS Xtreme Security provide bespoke intelligence gatheringequipment that can be integrated into everyday objects using high end microphones and electronics we guarantee thehighest quality video and audio intelligence gathering tools We have the following ultra small micro devices that can be fitted to items Kidon Ver 2 Tacking Device Intergrations Tracking Device Belt Intergrations Rock Integration Fire Extinguisher Integrations Laptop Integrations Laptop Chaarger Integrations TV Integrations Portfolio Integrations Training Shoes Integrations Key Camera INTERGRATIONS KEY CAMERA This video device is a micro camera hidden in a BMW key The design is simple and common being easily mistaken for a regular car key The camera is located at the frontal side so that you can easily use it while recording The video resolution is 1280 x 720 pixels and the picture is 1600x1200 pixels The micro camera has a night vision function and the quality of the film is in HD Also the motion detection function will help reduce the battery consumption by activating the recording mode only when it s needed

Page 17

Total Encrypted HELIX LAPTOP SYSTEM Helix Laptop system is a completely secure encrypted mobile work station which keeps your data and communications completely private A slim line lightweight option featuring a fully encrypted SSD hard disk with a custom Linux operating system This range is tailor made for the corporate sector and private individuals who prefer a discreet look for their secure device Our development team have stripped out the standard hard drive from the HP Elite Book and replaced it with an SSD hard disk allowing for a silent and faster performance Our notebook comes with a THREE password entry process to protect your data and files Utilizing a Linux based operating system which has been fully customized to allow clients to use straight out the box with all settings and programs you could ever need already installed With a 5th Gen Intel Core processors that yield impressive speed and performance Power through your day with extra battery life when using the optional long life slice battery built with professionals in mind Our laptops come complete with a fully secure VPN connection FEATURES FIPS 140 2 Level 3 Certified Certificate No 1873 FIPS PUB 197 Validated Encryption Algorithm Real time military grade CBC AES 256 bit hardware Hardware and Software Tightened Brute Force Hack Defense Mechanism Fully Encrypted SSD Hard Drive Crypto parameters protected with SHA 256 hashing Three password start up process Preloaded with easy to use encryption software Custom secure MPC VPN included Subscription Renewal Required Pre configured Internet and software settings hardened for security PRODUCTS INTELLIGENCE GATHERING INTERGRATIONS Xtreme Security provide bespoke intelligence gatheringequipment that can be integrated into everyday objects using high end microphones and electronics we guarantee thehighest quality video and audio intelligence gathering tools We have the following ultra small micro devices that can be fitted to items Kidon Ver 2 Tacking Device Intergrations Tracking Device Belt Intergrations Rock Integration Fire Extinguisher Integrations Laptop Integrations Laptop Chaarger Integrations TV Integrations Portfolio Integrations Training Shoes Integrations Key Camera INTERGRATIONS KEY CAMERA This video device is a micro camera hidden in a BMW key The design is simple and common being easily mistaken for a regular car key The camera is located at the frontal side so that you can easily use it while recording The video resolution is 1280 x 720 pixels and the picture is 1600x1200 pixels The micro camera has a night vision function and the quality of the film is in HD Also the motion detection function will help reduce the battery consumption by activating the recording mode only when it s needed

Page 18

KIDON VER 2 INTERGRATIONS FIRE EXTINGUiSHER PRODUCT CAPABILITIES INTERGRATIONS LAPTOP CHARGER The Kidon V2 is state of the art in the new store and forward intelligence gathering device the device can be used in building or vehicles storing the valuable information gathered throughout the day on the device that can then be downloaded to a phone laptop or tablet from up to 100 metres away Compression and quality rates can be adjust for quicker downloads Remote reception downloading of pre recorded data from an internal memory card to a mobilephone tablet or notebook computer Sending of pre recorded data from an internal memory card by email via a Wi Fi channel Scheduled recording Scheduled Wi Fi activation Automatic manual selection of a free Wi Fi channel by lowest possible interference level TRACKING DEVICE Real time free tracking GSM GPS dual mode positioning positioning accuracy of up to 5 meters FEATURES 5000mA ultra large capacity battery super long standby charge once can standby for 90 days Electronic fence over speed low power alarm voice monitor Track the location of vehicles The tracker comes with a one year s subscription world wide data sim and user friendly control panel enabling you to monitor the device live IPX6 waterproof case INTERGRATONS TRACKING DEVICE IN BELT The GPS tracker uses a GSM SIM card and is compatible with all networks Vodafone Orange Cosmote Digi After you install the card the device will respond with an SMS reporting its position GPS coordinates The SMS response time is between 10 25 seconds depending on the network Moreover the device has an SOS button that when clicked it automatically sends SMS to a preset number with details of the position of the device In this way you can give this device to your children your elderly and your family in general INTERGRATIONS ROCK Decorative objects can be placed in a variety of rooms and spaces whether it is your own home or at the office An example is this decorative rock that allows the integration of many types of devices GSM microphones microcameras or IP cameras It is possible to install inside 3G systems WiFi with internet access from anywhere in the world RF up to 1km and other DVR products Systems can record non stop or be activated only when it detects movement or voice The system is designed especially for monitoring Inside this portofolio we can accommodate an audio and or video professional recording device The design of this product is not limited we can make a series of integrations in any types of portofolio as long as the space allows us We can use recorders GSM microphones or even microcameras The advantages of this charger is the continous autonomy and the space that allows the integration The best solution is to use a GSM microphone that functions on a SIM card placed inside Once you have connected the extension cable to the socket by simply calling card you can listen from anywhere in the world what s happening around it INTERGRATIONS TV The TV the computer display this type of technology allows the integration of very small devices You can either bring your own TV or we can help you buy one The possibility of making this system depends on the type of TV and also on the space that allows us to integrate We use wide range of devices from micro cameras to IP cameras from recorders to GSM microphones INTERGRATIONS PORTFOLIO The system is designed especially for monitoring Inside this portofolio we can accommodate an audio and or video professional recording device The design of this product is not limited we can make a series of integrations in any types of portofolio as long as the space allows us We can use recorders GSM microphones or even microcameras INTERGRATIONS COFFEE MACHINE The electrical appliances are suitable for integrations It depends of course on the purpose of the room where you place the surveillance system The coffee maker can be placed in the kitchen but also in the office or living room in the restaurant etc Some of the most interesting conversations take place when people drink coffee We integrate recorders IP cameras GSM microphones microcameras depending on what you need INTERGRATIONS TRAINING SHOES Trainers are very common items that can be worn without raising suspicions about their usefulness Depending on the model and the space limits we can integrate a wide range of devices One of the solutions are the recorders with which you can record audio what you are interested Another device is the GSM microphone that allows you to listen in real time conversations that take place in its proximity INTERGRATIONS LAPTOP This type of technology allows the integration of very small devices You can either bring your own laptop or we can help you buy one The possibility of making this system depends on the type of laptop and also on the space that allows us to integrate We use wide range of devices from microcameras to IP cameras from recorders to GSM microphones 18 TSCM info xtremesecurity eu www xtremesecurity eu TSCM info xtremesecurity eu www xtremesecurity eu 19

Page 19

KIDON VER 2 INTERGRATIONS FIRE EXTINGUiSHER PRODUCT CAPABILITIES INTERGRATIONS LAPTOP CHARGER The Kidon V2 is state of the art in the new store and forward intelligence gathering device the device can be used in building or vehicles storing the valuable information gathered throughout the day on the device that can then be downloaded to a phone laptop or tablet from up to 100 metres away Compression and quality rates can be adjust for quicker downloads Remote reception downloading of pre recorded data from an internal memory card to a mobilephone tablet or notebook computer Sending of pre recorded data from an internal memory card by email via a Wi Fi channel Scheduled recording Scheduled Wi Fi activation Automatic manual selection of a free Wi Fi channel by lowest possible interference level TRACKING DEVICE Real time free tracking GSM GPS dual mode positioning positioning accuracy of up to 5 meters FEATURES 5000mA ultra large capacity battery super long standby charge once can standby for 90 days Electronic fence over speed low power alarm voice monitor Track the location of vehicles The tracker comes with a one year s subscription world wide data sim and user friendly control panel enabling you to monitor the device live IPX6 waterproof case INTERGRATONS TRACKING DEVICE IN BELT The GPS tracker uses a GSM SIM card and is compatible with all networks Vodafone Orange Cosmote Digi After you install the card the device will respond with an SMS reporting its position GPS coordinates The SMS response time is between 10 25 seconds depending on the network Moreover the device has an SOS button that when clicked it automatically sends SMS to a preset number with details of the position of the device In this way you can give this device to your children your elderly and your family in general INTERGRATIONS ROCK Decorative objects can be placed in a variety of rooms and spaces whether it is your own home or at the office An example is this decorative rock that allows the integration of many types of devices GSM microphones microcameras or IP cameras It is possible to install inside 3G systems WiFi with internet access from anywhere in the world RF up to 1km and other DVR products Systems can record non stop or be activated only when it detects movement or voice The system is designed especially for monitoring Inside this portofolio we can accommodate an audio and or video professional recording device The design of this product is not limited we can make a series of integrations in any types of portofolio as long as the space allows us We can use recorders GSM microphones or even microcameras The advantages of this charger is the continous autonomy and the space that allows the integration The best solution is to use a GSM microphone that functions on a SIM card placed inside Once you have connected the extension cable to the socket by simply calling card you can listen from anywhere in the world what s happening around it INTERGRATIONS TV The TV the computer display this type of technology allows the integration of very small devices You can either bring your own TV or we can help you buy one The possibility of making this system depends on the type of TV and also on the space that allows us to integrate We use wide range of devices from micro cameras to IP cameras from recorders to GSM microphones INTERGRATIONS PORTFOLIO The system is designed especially for monitoring Inside this portofolio we can accommodate an audio and or video professional recording device The design of this product is not limited we can make a series of integrations in any types of portofolio as long as the space allows us We can use recorders GSM microphones or even microcameras INTERGRATIONS COFFEE MACHINE The electrical appliances are suitable for integrations It depends of course on the purpose of the room where you place the surveillance system The coffee maker can be placed in the kitchen but also in the office or living room in the restaurant etc Some of the most interesting conversations take place when people drink coffee We integrate recorders IP cameras GSM microphones microcameras depending on what you need INTERGRATIONS TRAINING SHOES Trainers are very common items that can be worn without raising suspicions about their usefulness Depending on the model and the space limits we can integrate a wide range of devices One of the solutions are the recorders with which you can record audio what you are interested Another device is the GSM microphone that allows you to listen in real time conversations that take place in its proximity INTERGRATIONS LAPTOP This type of technology allows the integration of very small devices You can either bring your own laptop or we can help you buy one The possibility of making this system depends on the type of laptop and also on the space that allows us to integrate We use wide range of devices from microcameras to IP cameras from recorders to GSM microphones 18 TSCM info xtremesecurity eu www xtremesecurity eu TSCM info xtremesecurity eu www xtremesecurity eu 19

Page 20

THE BUSINESS ORGANISATION AS THE TARGET OF COMPETITORS Theft of intellectual property and business espionage are phenomena that are now receiving great attention In the past there was a misconception that business espionage was a limited matter which in any case could only affect reputable companies and businesses In the case of business ideas and business espionage this concept has passed and the understanding of the importance of maintaining a high confidentiality profile in every business process is growing Another misconception that still prevails among leading figures in the business sector is that it is better for them to buy control of the business espionage sphere so that they can take the appropriate measures to deal successfully with their challenges and threats However a close examination shows that many programs that are supposed to combat business espionage which are actually installed by the business are capable of providing a proper response to the demands of thinking in the new industrial era Here are some of the types of destructive threats in this area that have already shaken the business world as a whole Attacking the business by competitors one of the most common threats It is realized through an intraorganizational entity such as one of the employees a member of the roof organization of the business or a production manager or external as a subcontractor 20 Attacking specific products by pirates and counterfeiters is considered a most intrusive threat It is often implemented by organized crime elements who seek to sabotage specific technologies or development programs or manipulate their products for the purpose of scrapping large profits According to US Chamber of Commerce statistics the percentage of products that have been forged or manipulated amounts to 5 7 of the global economy Moreover more than 750 000 people have lost their jobs worldwide as a direct result of the realization of such threats This phenomenon has left its mark on sales of only 250 million in the US This type of crime takes place in all areas of business regardless of industry or interest and is particularly vulnerable to software development worldwide State or state sponsored theft Government or state espionage is now considered a serious global threat This threat is realized mainly to obtain access to TSCM info xtremesecurity eu www xtremesecurity eu advanced development programs which are managed by private entities and which have a public interest The process of implementation is usually carried out through intelligence services or governmental law enforcement agencies From a practical point of view these may sometimes be used to install sophisticated software or to be assisted by a worker with the steps of the organization being attacked Today it is possible to successfully deal with the entire gamut of these threats with the help of professional security services How to save your business from business espionage Business espionage This term has gained considerable weight over the last few years Business espionage is considered destructive and illegal Its potential damage is especially threatening these days as every business is struggling more than ever to gain a proper grip on its market segment This threat is often seen from competitors who seek to trace the secrets of the business through long term monitoring of its activity They will therefore attempt to lay their hands on confidential business documents sensitive technical information databases about the clients of the business and price proposals for tenders Effective espionage may decide the fate of the business being attacked This is why many companies are now looking for the services of TSCM experts These experts have developed their professional capabilities over a long period of time and have gained their leadership by proven successes in detecting industrial spying activities It is common for everyone to master the latest technological innovations in particular and to fight hostile technological surveillance in general A short search on Google will raise the details of many companies offering TSCM services The main challenge is to choose a company that will indeed help you successfully ward off the business espionage threats hovering over your business Misleading may leave you exposed to the risk of leakage of your business secrets even if you allegedly take all the right precautions The following is a representative set of considerations that should be taken into consideration when choosing a company Risk assessment Conducting inspections without understanding the business environment that is threatened and analyzing accordingly not only may completely miss its purpose but also cause irreparable damage to the business Most TSCM info xtremesecurity eu www xtremesecurity eu 21

Page 21

THE BUSINESS ORGANISATION AS THE TARGET OF COMPETITORS Theft of intellectual property and business espionage are phenomena that are now receiving great attention In the past there was a misconception that business espionage was a limited matter which in any case could only affect reputable companies and businesses In the case of business ideas and business espionage this concept has passed and the understanding of the importance of maintaining a high confidentiality profile in every business process is growing Another misconception that still prevails among leading figures in the business sector is that it is better for them to buy control of the business espionage sphere so that they can take the appropriate measures to deal successfully with their challenges and threats However a close examination shows that many programs that are supposed to combat business espionage which are actually installed by the business are capable of providing a proper response to the demands of thinking in the new industrial era Here are some of the types of destructive threats in this area that have already shaken the business world as a whole Attacking the business by competitors one of the most common threats It is realized through an intraorganizational entity such as one of the employees a member of the roof organization of the business or a production manager or external as a subcontractor 20 Attacking specific products by pirates and counterfeiters is considered a most intrusive threat It is often implemented by organized crime elements who seek to sabotage specific technologies or development programs or manipulate their products for the purpose of scrapping large profits According to US Chamber of Commerce statistics the percentage of products that have been forged or manipulated amounts to 5 7 of the global economy Moreover more than 750 000 people have lost their jobs worldwide as a direct result of the realization of such threats This phenomenon has left its mark on sales of only 250 million in the US This type of crime takes place in all areas of business regardless of industry or interest and is particularly vulnerable to software development worldwide State or state sponsored theft Government or state espionage is now considered a serious global threat This threat is realized mainly to obtain access to TSCM info xtremesecurity eu www xtremesecurity eu advanced development programs which are managed by private entities and which have a public interest The process of implementation is usually carried out through intelligence services or governmental law enforcement agencies From a practical point of view these may sometimes be used to install sophisticated software or to be assisted by a worker with the steps of the organization being attacked Today it is possible to successfully deal with the entire gamut of these threats with the help of professional security services How to save your business from business espionage Business espionage This term has gained considerable weight over the last few years Business espionage is considered destructive and illegal Its potential damage is especially threatening these days as every business is struggling more than ever to gain a proper grip on its market segment This threat is often seen from competitors who seek to trace the secrets of the business through long term monitoring of its activity They will therefore attempt to lay their hands on confidential business documents sensitive technical information databases about the clients of the business and price proposals for tenders Effective espionage may decide the fate of the business being attacked This is why many companies are now looking for the services of TSCM experts These experts have developed their professional capabilities over a long period of time and have gained their leadership by proven successes in detecting industrial spying activities It is common for everyone to master the latest technological innovations in particular and to fight hostile technological surveillance in general A short search on Google will raise the details of many companies offering TSCM services The main challenge is to choose a company that will indeed help you successfully ward off the business espionage threats hovering over your business Misleading may leave you exposed to the risk of leakage of your business secrets even if you allegedly take all the right precautions The following is a representative set of considerations that should be taken into consideration when choosing a company Risk assessment Conducting inspections without understanding the business environment that is threatened and analyzing accordingly not only may completely miss its purpose but also cause irreparable damage to the business Most TSCM info xtremesecurity eu www xtremesecurity eu 21

Page 22

What to do if you think they re being bullied step by step instructions About 60 percent of those who suspect being eavesdropped are proven to be right Therefore it is very important not to ignore anything that seems suspicious or strange to you This is a wide range of strange sound effects coming from your handset surprising behavior of your laptop files that have disappeared from your workstation or an unusual location of your office furniture are just some of the relevant phenomena you might encounter in your work environment Generally people panic in such circumstances and in the context here they may warn unintentionally and even unwittingly of course the spying spy thereby causing nothing but damage On the other hand making a series of intelligent steps can help them locate the eavesdropping spy and prevent the continued leakage of sensitive business information These steps are listed below well known TSCM companies invest the full amount of time required to assess risks to the business For this purpose they discuss the relevant issues with the senior representatives of the business organization and may even suggest that they take preemptive measures In some cases TSCM experts mayrecommend that business representatives avoid testing or even performing anyother TSCM activity Discretion Every business owner prefers to maintain a high level of discretion in his professional conduct A company worthy of its name in the field of TSCM serviceswill always respect this matter and in this spirit plan its testing activity in a manner that will minimize if any the normal and natural course of the business s activity As a complement to this the Company s experts will be able to support all of their professional conclusions with the necessary findings Qualifications TSCM service provider competence analysis is importantbefore selecting it See How to choose 22 TSCM info xtremesecurity eu www xtremesecurity eu STEP 1 Be sure of your suspicions Sometimes a leak of sensitive information does not come from eavesdropping This may be a slip of the tongue of someone from your employees or colleagues or even your own First ascertain the extent of the shared information that your partners share with the business activity referring both to employees and colleagues and locate the possible sources of leaks It means asking first those with whom you share this information If that does not work go to the conference room where we discuss this information Is something there out of place or organized in a different way than usual If so there s a good chance you re being bullied STEP 2 Do not touch or change anything Once you realize something is wrong the best thing is to be vigilant without taking any special step unless you are a TSCM specialist Do not touch anything that is out of place or any object that you suspect has been planted with a bug Instead stay calm Physical intervention may warn the eavesdropper and may even adversely affect the future testing activities of TSCM experts STEP 3 Keep it to yourself Many times the means of eavesdropping are transplanted by internal entities from the business offices or by those who have easy access to sensitive business information Therefore we recommend that you do not disclose anything to anyone when you act to verify your suspicions The discovery of the truth may once again transmit a message of warning to the eavesdropper who can then evade the efforts of discovery of the examination STEP 4 Contact a TSCM service provider Now is the time to call the help of an expert or a TSCM service provider Contact them via a phone outside of your business such as a pay phone or send them a message from an email address that is not associated with your business when you use a computer that is not linked to your business computer network Tell him everything and arrange an immediate meeting with him STEP 5 Starting with the TSCM process The professional who has called will perform the process using all the necessary tools and methods Help him with whatever information is relevant to his work in order to succeed in his mission A worthy professional should be able to solve the problem the amount of time it takes to do so depends critically on its complexity It is very important that you implement your advice on preventing your exposure to future eavesdropping threats STEP 6 Be vigilant At the end of the process it is very important to be very careful in sharing your business information with others You need those who share it with you to keep it a secret Carefully secure the information you transmit over the phone and through your e mail Be sure to stay abreast of any changes made in your office environment Above all make periodic checks against eavesdropping in your business offices and any other sensitive place within it to ensure that you are completely safe from threats TSCM info xtremesecurity eu www xtremesecurity eu 23

Page 23

What to do if you think they re being bullied step by step instructions About 60 percent of those who suspect being eavesdropped are proven to be right Therefore it is very important not to ignore anything that seems suspicious or strange to you This is a wide range of strange sound effects coming from your handset surprising behavior of your laptop files that have disappeared from your workstation or an unusual location of your office furniture are just some of the relevant phenomena you might encounter in your work environment Generally people panic in such circumstances and in the context here they may warn unintentionally and even unwittingly of course the spying spy thereby causing nothing but damage On the other hand making a series of intelligent steps can help them locate the eavesdropping spy and prevent the continued leakage of sensitive business information These steps are listed below well known TSCM companies invest the full amount of time required to assess risks to the business For this purpose they discuss the relevant issues with the senior representatives of the business organization and may even suggest that they take preemptive measures In some cases TSCM experts mayrecommend that business representatives avoid testing or even performing anyother TSCM activity Discretion Every business owner prefers to maintain a high level of discretion in his professional conduct A company worthy of its name in the field of TSCM serviceswill always respect this matter and in this spirit plan its testing activity in a manner that will minimize if any the normal and natural course of the business s activity As a complement to this the Company s experts will be able to support all of their professional conclusions with the necessary findings Qualifications TSCM service provider competence analysis is importantbefore selecting it See How to choose 22 TSCM info xtremesecurity eu www xtremesecurity eu STEP 1 Be sure of your suspicions Sometimes a leak of sensitive information does not come from eavesdropping This may be a slip of the tongue of someone from your employees or colleagues or even your own First ascertain the extent of the shared information that your partners share with the business activity referring both to employees and colleagues and locate the possible sources of leaks It means asking first those with whom you share this information If that does not work go to the conference room where we discuss this information Is something there out of place or organized in a different way than usual If so there s a good chance you re being bullied STEP 2 Do not touch or change anything Once you realize something is wrong the best thing is to be vigilant without taking any special step unless you are a TSCM specialist Do not touch anything that is out of place or any object that you suspect has been planted with a bug Instead stay calm Physical intervention may warn the eavesdropper and may even adversely affect the future testing activities of TSCM experts STEP 3 Keep it to yourself Many times the means of eavesdropping are transplanted by internal entities from the business offices or by those who have easy access to sensitive business information Therefore we recommend that you do not disclose anything to anyone when you act to verify your suspicions The discovery of the truth may once again transmit a message of warning to the eavesdropper who can then evade the efforts of discovery of the examination STEP 4 Contact a TSCM service provider Now is the time to call the help of an expert or a TSCM service provider Contact them via a phone outside of your business such as a pay phone or send them a message from an email address that is not associated with your business when you use a computer that is not linked to your business computer network Tell him everything and arrange an immediate meeting with him STEP 5 Starting with the TSCM process The professional who has called will perform the process using all the necessary tools and methods Help him with whatever information is relevant to his work in order to succeed in his mission A worthy professional should be able to solve the problem the amount of time it takes to do so depends critically on its complexity It is very important that you implement your advice on preventing your exposure to future eavesdropping threats STEP 6 Be vigilant At the end of the process it is very important to be very careful in sharing your business information with others You need those who share it with you to keep it a secret Carefully secure the information you transmit over the phone and through your e mail Be sure to stay abreast of any changes made in your office environment Above all make periodic checks against eavesdropping in your business offices and any other sensitive place within it to ensure that you are completely safe from threats TSCM info xtremesecurity eu www xtremesecurity eu 23

Page 24

XTREME SECURITY AND ASSOCIATES info xtremesecurity eu www xtremesecurity eu