technical surveillance counter measures tscm... · 4 5 lberta tscm is a subsidiary company of...
TRANSCRIPT
2 3
VISION
OUR VISION IS TO PROTECT OUR CLIENTS
FROM ALL TYPES OF THREATS TO CREATE A
SAFE AND SECURE ENVIRONMENT.
MISSION
IN LINE WITH THE COMPANY’S VISION,
ALBERTA TSCM ENDEAVOURS TO PROVIDE
ITS CUSTOMERS WITH SOPHISTICATED
SECURITY PRODUCTS AND KNOWLEDGE THAT
FULFIL THEIR WANTS AND NEEDS. WE STRIVE
TO IDENTIFY SOLUTIONS THAT GIVE OUR
CUSTOMERS THE REASSURANCE THEY DESERVE.
4 5
lberta TSCM is a subsidiary company
of Alberta Group which invests in
sophisticated technology that intercepts
radio frequencies and surveillance devices used for
espionage. Alberta Group is a global provider of
total solutions which has excelled in all aspects of its
ventures and endeavours achieving certification in
quality standards such as ISO 9001 and ISO 14001.
TSCM involves conducting an exhaustive and
meticulous physical inspection using electronic
surveillance for all covert cameras, telephone
transmitters and/or room bugs. All devices that
pose a possible security breach in client operations
and compromise sensitive personal and business
assets are identified and subsequently eliminated.
Alberta TSCM is underpinned by experience,
knowledge and wisdom gained through years of
evolving and adapting to the ever-changing world
of crime, guaranteeing flexibility, responsiveness
and support to our customers’ specific needs. Our
broad spectrum of security measures is continually
OUR APPROACH COMPANY OVERVIEW
improved and revised according to the latest
trends in crime, thus providing reliable solutions
to eradicate any form of espionage and acts of
terrorism. Moreover, Alberta TSCM offers the
opportunity for clients to purchase sophisticated
security equipment that intercepts radio
frequencies and spyware devices.
Alberta’s modus operandi is also determined by
the evolving needs of our clients. No scenario is
ever identical to another. Our maxim is that the
approach and solution offered to clients should
reflect the uniqueness of their company and case
in hand.
Theft of information is exceedingly dangerous and
can ruin a business, tarnish one’s integrity and ruin
an otherwise unblemished reputation. We therefore
recommend professional advice and services to
fully secure intellectual and proprietary business
information by eliminating risks of exposing
confidential data that could be used maliciously by
third parties with malevolent motives.
SITE TSCM RISK ASSESSMENT
to identify security weaknesses
STRATEGY DEVELOPMENT
to review current security
procedures and policies and
to take a holistic approach
to augment the company’s
objectives
ACTION PLAN
to implement the necessary
corrective actions and
preventive measures
1 2 3
OUR THREEFOLD APPROACH
Alberta TSCM adopts a strategic approach to ensure that our customers understand
the threats they may face, while bug sweep policies and procedures ascertain that a
company’s business reputation and information remains intact. Furthermore, we assist
clients to implement best work practices and undertake all the necessary preventive
measures to prevent any form of threat.
6 7
TSCM is an acronym originated by the United
States Federal Government that stands for
Technical Surveillance Counter Measures which
denotes the process of bug-sweeping or electronic
counter surveillance. Qualified and trained
personnel are engaged to conduct a professional
evaluation of the area under inspection in order
to detect security weaknesses and to ensure that
there are no surveillance devices which pose a
threat to a company. Communication Security
(COMSEC), Information Technology Security (ITS)
and physical security play also a major role in
today’s technological world aiming towards a safer
and secure world!
Eavesdropping devices are usually planted in areas
where highly sensitive discussions take place such
as offices or boardrooms, mobile phones and
transport vehicles such as commercial and private
vehicles as well as yachts and the like.
Why are these devices planted?
Espionage or spying is a way of obtaining
confidential or secret information without
authorisation from the legitimate holder of said
information. Any company aware that information
has been leaked would definitely change business
strategy in order to safeguard its business’
reputation, integrity and financial sustainability. On
the contrary the illegitimate party would make use
of information to improve mainly their financial
position.
THE THREAT
THE SINGLE GREATEST ASSET HELD BY MOST COMPANIES IS THEIR INFORMATION.
8 9
IF ANY OF THE BELOW REPLIES IS A YES THAN YOUR BUSINESS IS AT RISK THAT COULD SERIOUSLY
DAMAGE YOUR COMPETITIVE EDGE OR REVEAL YOUR INNERMOST CONFIDENTIAL BUSINESS
PLANS. HOWEVER, IT IS NOT AN EASY TASK TO CONCLUSIVELY PROVE THAT YOUR BUSINESS IS
SUBJECT TO TECHNICAL ATTACK.
Do your competitors know your business?
Have you become aware that others know what you are about to do before you announce it?
Is information clearly being leaked?
Has your telephone changed in sound recently?
Have you noticed that your furniture or desk items do not seem to be in quite the right place?
Any unexplained callers and visitors to the office or home?
COULD MY BUSINESS BE UNDER THREAT?
Any individual, Government entity or private
business organisation whose sensitive information
may be exposed, is at risk. These threats can be
carried out for an array of reasons that range from
corrupt behaviour by staff to terrorism. Alberta
TSCM is there to assist its clients to implement
the correct security preventive measures which
safeguard a company’s proprietary information.
High Risk Political Situations (e.g. during electoral
campaigns, with embassies and government
entities etc...)
High Risk Business Situations (e.g. lawsuits, layoffs,
union activities etc...)
High Risk Personal Situations (e.g. separation,
divorce, litigation, upper income bracket etc...)
High Risk Occupation (e.g. judges, police officers,
attorneys, directors etc...)
The key to success for any business, particularly in
highly competitive markets as well as Government
organisations, is the protection of its information
which is the greatest asset most companies can
have. Be proactive; protect your information
before falling victim of espionage!
In order to safeguard your company’s information
from third parties, you need to use these technical
surveillance counter measures to detect these
harmful devices, eradicate them and jam any
transmission of radio frequencies.
WHO IS AT RISK?
Why choosing Alberta TSCM?
In view of the above, Alberta TSCM invested heavily in high-end technical equipment to provide its clients with an excellent
service, both in terms of the bug sweep service as well as guaranteeing product reliability and efficiency, flexibility to their
requirements, whilst assuring professionalism and absolute confidentiality at all times. This is reflected in the referral-based
growth of our business and client base, which stands testament to our excellent service delivery. Our services have been also
extended to an international level to a wide range of business and public sectors.
10 11
TSCM Risk Assessment
Bug sweeps – a thorough physical and electronic search of the area under study
Assisting in implementing corrective actions, recommendations
and preventive measures
Training awareness to all levels of staff.
BUGGING DEVICES
In today’s evolving world of technology where
devices are getting smaller, they have become
easier to hide. Hence, it simplifies matters to
eavesdroppers who can watch you through
a pinhole or an insert in clocks, lamps, smoke
detectors, electrical outlets and more. These
devices are cheap, easy to install, easy to conceal
and very effective. Tiny listening devices are also
commonly used and placed in areas of high-
sensitivity with the intent to obtain information
covertly. These types of bugs can either transmit a
signal to a recorder off-premises or directly into an
internal device.
RECORDING DEVICES
Ever since mobile phones overtook conventional
recording equipment, it has become even more
difficult to secure information during highly
sensitive meetings. Would you prohibit an
attendee from bringing his mobile into a meeting?
TYPES OF ATTACK
Probably not, as this could lead to other serious
repercussions such as conflict and doubting
the concept of business trust. A solution to the
aforementioned exists and Alberta TSCM has the
necessary expertise to install mobile jammers that
block recorders from recording.
TELEPHONE TAPPING AND BUGGING
The telephone line is another vulnerable medium
used by eavesdroppers. Telephones can be tapped
by simply attaching a wiretap to your phone line
that will allow listening in to a conversation or
transmitting audio to a recorder.
CYBERCRIME
Cybercrime is indeed on the increase and has
become high-profile since it could threaten a
nation’s security and financial health. High-tech
crimes include cyber-based terrorism, espionage,
computer intrusions, and major cyber fraud. An
information security review can be conducted as
part of the deployment of TSCM.
HOW CAN TSCM HELP MY BUSINESS COMBAT THESE THREATS?
12 13
CCTV COUNTER SURVEILLANCE CLOSE PROTECTION
Close Protection is a highly sought after service
which provides the end customer with protection
reassurance. Contrary to the image portrayed
by heavy handed bodyguards, professional close
protection deflects and deters any malevolent
action or circumstance.
Our team is dedicated, knowledgeable and
discreet; having the expertise to conduct risk
assessments, plan routes or events, screen venues
and prepare contingency plans for any eventuality.
CCTV is a highly effective tool to combat crime. Our latest technology, which is installed
by our highly trained technical staff, can be concealed in the most unexpected and
inconceivable places. Covert investigations can be carried out either on a short or
longer-term basis depending on the duration of the investigation. Our support and
service is tailor-made to our client’s requirements.
Irrespective of the level of security, our team
ensures that the protection provided is top notch
and as per our client’s expectations. Appointments
with clients are set from time to time to discuss
close protection plans and any required course of
action in order to guarantee total protection.
14 15
Consultancy is our starting point for the provision
of support and training. We provide assistance to
all our esteemed clients irrespective of whether
their requirements range from minute to high end
solutions. We strongly believe that knowledge
is the key to success for every business and
is an asset to be treasured. Hence, we highly
recommend that training is given to all company
employees including top level management, in
SUPPORT & TRAINING Ministries
Embassies
Banks
Casinos
Pharmaceutical companies
Security companies
order to protect the company’s interests and avoid
any threat which could compromise the company’s
integrity. Criminals have shifted their interest from
physical assets to high-value intellectual property.
Our awareness ensures that employees are
provided with practical information and guidance
including demonstrations of modern eavesdropping
and espionage methods.
Our aim is to meet or exceed our customers’ needs so to ensure our clients are satisfied with our service
and have the reassurance they deserve. Our highly trained dedicated team know how to combine personal
attention and commitment with expertise, thus providing each client an excellent service.
Below are some of the industries and countries we have worked in.
Malta
Libya
Nigeria
Egypt
Tunis
Morocco
Our customer focus is NOT a one-size-fits-all solution but is customized according to our clients needs.
CUSTOMER FOCUS
16
T (+356) 9947 7432
F (+356) 2148 4077
W ALBERTATSCM.COM
A SAN GWAKKIN ROAD, MRIEHEL, BKR3000, MALTA (EUROPE)