Technical Surveillance Countermeasures (TSCM) vs Insider Threat - 2019. An Insider Threat is a malicious threat to an organisation that emanates from people within the organisation, such as PAs, CPOs, Security Personnel, IT Managers, Employees, Contractors or Business Associates. Read More
ACS TSCM Rogue access points. The insider threat - 2019 should be a year where more importance and focus are placed on information security for businesses than ever before. Viruses and data breaches will continue to present themselves as threats, leading to unplanned downtime, intellectual property loss, andan increase in expenditure, but they won’t be the only ones. Read More
Audit Results: 2017. Advanced Corporate Solutions (ACS), the industry leaders in Technical Surveillance Countermeasures (TSCM) and Electronic Countermeasures Investigations (ECMI), is proud to announce and share the results of our 2017 Technical Surveillance Counter Measures Audit. Read more
TSCM Spectrum Analyser: Now you can have tomorrows TSCM software today. Read More
TSCM - Technical Surveillance Counter Measures: Corporate eavesdropping poses a significant risk to any organization. Global statistics shows that the threat of internal eavesdropping is real and imminent. The statistics also shows that the majority of eavesdropping devices found during “Bug Sweeps” were planted either by current employees, recently terminated employees or associates. Read more
Sports teams need privacy protection. Russian hockey team finds bugging device. Sports teams need to be concerned about privacy and confidentiality.A listening device was apparently discovered in the coaches room of the Russian hockey team, Metallurg Magnitogorsk, at the Ice Palace in St. Petersburg. - Read more
Panama follow up Click to view
How cops and crooks can 'grab' your cellphone - and you - 27 Nov 2015 00:00 Heidi Swart
Click to view
Man in dock over R25m bugging device (Star 4 August 2015) Click to view
‘Grabber’ nabbed in big sting (Star 3 August 2015) Click to view
Three held for possessing ‘spy machine’ (Star 3 August 2015) Click to view
SA Spies’ Shopping List (Sunday Times 12 July 2015) Click to view
Suspicious of your partner? Bug them. (Sunday Times, 17 May 2015) Click to view
“De-bugging” Partners for 20 Years in Europe & Sub-Saharan Africa (Intersec February 2015) Click to view
Protect your intellectual property and trade secrets against the imminent threat of corporate espionage. The reality of focussed communication breaches.
- Click to view
How can I tell if my mobile phone is tapped. Mobile spy and cellular bugging
- Click to view
Hack turns the Cisco phone on your desk into a remote bugging device No fix yet for attack that allows eavesdropping on private conversations.
- Click to view
YOUR Cisco VoIP phone is easily TAPPED, warns CompSci prof Eavesdrop on calls using kernel security bug
- Click to view
29C3: Big bugging with Cisco VoIP phones At the 29C3 hacker congress in Hamburg, security researchers from Columbia University have demonstrated that the microphone in the receiver of internet-based Cisco phones can be turned into a remotely controlled listening device.
- Click to view
Popular office phones vulnerable to eavesdropping hack, researchers say This small gadget can be attached to a single Cisco IP phone and turn an entire company’s network into a sophisticated bugging device within seconds, researchers say.
- Click to view
Serious flaw allows Cisco IP phones to be used for spying Researchers have demonstrated how a serious vulnerability in the 7900 series of the Cisco (NASDAQ: CSCO) Unified IP Phones can be used to transform them into bugging devices in order to eavesdrop on private conversations.
- Click to view
FBI's Desire to Wiretap Every New Technology Makes Us Less Safe
Here they go again. Every year or so we end up writing about the FBI's desire for better wiretapping capabilities for new technologies, such as Skype. Basically, the FBI argues that because "bad guys" might use those tools to communicate in secret, they need backdoors to make sure that they can keep tabs on the bad guys.
- Click to view
DA: County controller under investigation for wiretapping
Luzerne County Controller Walter L. Griffith Jr. is under criminal investigation for illegally recording dozens of conversations over the last two years, District Attorney Stefanie Salavantis told The Citizens' Voice, a Times-Shamrock newspaper.
- Click to view
"Debugging" Corporate Aircraft Blake Technical Limited carry out comprehensive TSCM electronic countermeasure searches specifically geared for Corporate Aircraft.
- Click to view
The Secret War Foreign spies hack computers to bleed billions from industry and steal military secrets.
- Click to view
Did News Corp. properties break any U.S. laws?
Editors at the New York Post pulled junior staffers into two closed-door meetings on Tuesday and told them, "We have to be on our P's and Q's and not engage in any kind of obvious, unethical journalistic things," according to a source close to the Post.
- Click to view
Britain admits to Cold War-style espionage using fake rock
LONDON — In a rare acknowledgment of espionage reminiscent of the Cold War, a former British government official admitted that a fake rock discovered in 2006 by the Russian FSB secret service in a Moscow park concealed a listening device planted by British spies.
- Click to view
We pride ourselves on well-established accreditation and association with the local and international authorities and bodies.