Comprehensive physical and electronic search of areas of concern by highly trained experts and technicians. Use of multiple means to examine a room’s physical structure, furnishings and content; detect the presence of audio surveillance devices; and identify security weaknesses that could allow a technical penetration or eavesdropping.
Application of sophisticated, laboratory-grade technical equipment to discover powered devices, locate transmitters and identify resident RF signals to determine if sensitive information can be compromised.
- Routine Screening: Systematic, schedule-based TSCM sweeps of locations where information is at the highest risk.
- Random or Threat-Specific Screening: Ad hoc TSCM sweeps when circumstances warrant or intelligence dictates.
- Live Monitoring: Continuous, on-scene electronic monitoring and surveillance during special events.