Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity & Business Resilience

Why You Need TSCM Now More Than Ever

By Daniil Davydoff, Ra Tiedemann-Nkabinde
Spy
December 10, 2019

Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers? Are encrypted communications apps truly secure from state-affiliated intrusion? Are our corporate networks compromised by hackers? This newfound interest in information security is a good thing, but amidst all the new risks we should not forget that the tried-and-true approaches to spying — especially the use of electronic surveillance devices — are more of a threat than ever. Just ask the former CEO of German drug maker Stada, who confirmed in 2017 that his personal vehicle was bugged amidst contested takeover discussions.

This case and others highlight not just the corporate infosec dangers posed by electronic surveillance devices but also the indirect costs to the victims, who lose valuable time worrying about eavesdroppers and may have justified anxiety about their physical security as well. In order to mitigate this risk, corporate security leaders are increasingly recognizing the need for comprehensive technical surveillance countermeasures (TSCM) programs. TSCM involves the detection and potentially the neutralization of unwanted electronic surveillance devices. Experts conduct comprehensive inspections, or “sweeps”, of buildings, rooms, vehicles and other places where devices may be lurking.

TSCM has long been part of the asset protection arsenal, but several trends suggest it is now more necessary than ever:

  • Cheap, accessible surveillance devices are proliferating: The surveillance device market is booming, with the number of consumer surveillance devices sold in 2019 expected to be more than double the number recorded for 2018. U.S. consumer spending on surveillance cameras alone – just one of the many types of devices now on the market – is expected to reach $4 billion in 2023, an increase from the $2.1 billion recorded in 2018. With rapid improvements in technology, the previously prohibitive cost to getting one’s hands on surveillance devices is becoming less of a barrier with the introduction of a plethora of low-cost, yet relatively sophisticated, devices that can easily be purchased via most major online retailers. The proliferation is democratizing access, once the reserve of specialized intelligence and security entities, enabling a whole new class of threat actor to leverage powerful technology that can be turned against corporations, their assets, leaders, and personnel.
  • Corporate espionage is booming: The U.S. economy loses up to $600 billion per year as a result of stolen intellectual property, according to a 2017 report to Congress. Corporate espionage is a growing illicit market, with indicators suggesting an upward trend for the foreseeable future. In California’s Bay Area, home to Silicon Valley’s tech powerhouses, economic espionage and the theft of trade secrets have been rising sharply over the past two decades and in the last five years indictments have increased by 45% compared to the previous five years.
  • Insider threats are on the rise: Industry research from the cybersecurity world indicates insider threats have been on the rise in tandem with the use of a broader range of devices by employees, the deployment of cloud-based systems, and increasing accessibility to malicious technology. As Verizon’s 2019 Data Breach Investigations Report highlights, insider threat incidents have been increasing in the last four years and 34% of recorded breaches were perpetrated by insider actors, often for monetary gain. Although these incidents are typically not physical in nature, violations of information security policies in the cyber world can act as a stepping stone toward physical security violations, including through the use of electronic surveillance.
  • Business travel is expanding: In an increasingly globalized market context, long-distance business travel is becoming an unavoidable necessity. Industry data indicates that there are 445 million business trips per year, with forecasts showing further growth over the coming years. With the potential for travel to unfamiliar locations, emerging markets, and countries with varying standards of privacy rights, state security oversight, and organized criminal elements, the prospect for corporate travelers and executives to be targeted by electronic surveillance measures has never been greater. Such targeting can take the form of compromised conference or hotel rooms, vehicles, or even personal clothing, luggage, and electronic devices that have been left unattended for any period of time.

Establishing an effective TSCM program for your organization requires consideration of several key elements. Expertise is critical, and TSCM strategies require the deployment of in-house or outsourced TSCM specialists with extensive backgrounds in the detection of the latest electronic surveillance devices. Knowledge about current deployment and exploitation tactics used by threat actors is crucial as well. A TSCM program also needs to utilize state-of-the-art technology. Individuals conducting sweeps must use both top-of-the-line radio frequency (RF) analyzers as well as other instruments that can detect abnormalities in electrical currents, phones, Voice over Internet protocol (VOIP) systems, and electronics generally. Finally, a TSCM program must be highly mobile. Whether it’s a conference room for a high-stakes meeting in Singapore, an executive’s home in the French Riviera, or a vehicle to be used by a senior corporate leader in Mexico, TSCM teams need to have the capacity to conduct sweeps at the drop of a hat in a variety of global contexts.

KEYWORDS: encrypted devices hacking insider threats risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan davydoff   pic1

Daniil Davydoff, CPP, is Director, Research Management and Operations at Eurasia Group and director of social media for the World Affairs Council of Palm Beach. He has been published by ASIS International/Security Management, Risk Management Magazine, The National Interest, The Carnegie Council for Ethics in International Affairs, Foreign Policy and RealClearWorld, among other outlets. His views do not reflect those of his company.

Daniil Davydoff can be contacted on LinkedIn or at davydoff@eurasiagroup.net

Ra tiedemann nkabinde

Ra Tiedemann-Nkabinde is a global security intelligence analyst at AT-RISK International. He earned his PhD in finance and religion at the University of Cape Town. His views do not reflect those of his company. He can be contacted on LinkedIn or at rtiedemann@at-riskinternational.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security leadership responsive default security

    Why Reputational Risk is a Security Risk and What to Do About It

    See More
  • global-enews

    Why Your Next Intelligence Analyst Should Be a Workplace Violence Analyst

    See More
  • social-enews

    6 Links Between Social Media and Violence You Haven’t Thought About

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!