TSCM vs Insider Threat - 2019. An Insider Threat is a malicious threat to an organisation that emanates from people within the organisation, such as PAs, CPOs, Security Personnel, IT Managers, Employees, Contractors or Business Associates. Read More

ACS TSCM Rogue access points. The insider threat - 2019 should be a year where more importance and focus are placed on information security for businesses than ever before. Viruses and data breaches will continue to present themselves as threats, leading to unplanned downtime, intellectual property loss, andan increase in expenditure, but they won’t be the only ones. Read More

Stay one step ahead. Marie Clutterbuck reveals why the business is the new target for cyber criminals and explains what can be done to limit the threats. Intersec June 2019. Read More

Audit Results: 2017. Advanced Corporate Solutions (ACS), the industry leaders in Technical Surveillance Countermeasures (TSCM) and Electronic Countermeasures Investigations (ECMI), is proud to announce and share the results of our 2017 Technical Surveillance Counter Measures Audit. Read more

Can you detect wired microphones? Bloodhound can. Read More

Facing up to Cyber Threats: Simon Davies on best practise to avoid the risk of cyber attack. Read More

TSCM Spectrum Analyser: Now you can have tomorrows TSCM software today. Read More

TSCM - Technical Survaillance Counter Measures: Corporate eavesdropping poses a significant risk to any organization. Global statistics shows that the threat of internal eavesdropping is real and imminent. The statistics also shows that the majority of eavesdropping devices found during “Bug Sweeps” were planted either by current employees, recently terminated employees or associates. Read more

Sports teams need privacy protection. Russian hockey team finds bugging device. Sports teams need to be concerned about privacy and confidentiality.A listening device was apparently discovered in the coaches room of the Russian hockey team, Metallurg Magnitogorsk, at the Ice Palace in St. Petersburg. - Read more

Cyber Insurance: getting it right. Intersec March 2017. The cyber insurance market is constantly evolving as a paradoxical segment where fear continues to drive custom, while conversely industry inefficiency ensures growth of the insurance industry. Read more

2017 Cybercrime Security Predictions. With High incidents such as Tesco Bank and Talk Talk, the start of 2017 is a great time to look at the coming months and prepare - Intersec January 2017 - Click to view

An end to eaves dropping. Eavesdropping is historically a medieval term from when most dwellings were single storey, the roof rafters supported on the top of the walls, the roofing material laid on the rafters - Intersec January 2017 - Click to view

Remote spectrum surveillance and monitoring. Software Defined Radio (SDR) permits operator-assisted TSCM inspections to be conducted based on a new moving target threat model that is specific to the operational deployment of budget friendly, fully feature operator assisted, or Remote Spectrum Surveillance and Monitoring (RSSM) - Intersec January 2017 - Click to view

Is Your Physical Security Cyber Secure? Simon Gawne discusses the need for security teams to expand their remit to include cyber defence as attackers increasingly target vulnerable connected security devices - Intersec Magazine - Click to view

Bugging device found in All Blacks' meeting room: It was reportedly planted inside a chair and discovered during a routine sweep for bugs ahead of the match against Australia. 20 August 2016 - Sky News - Click to view

Cyber Security Breach - What to do? June 2016 - Intersec Magazine. Click to view

Executive Protection: What can you do about corporate espionage? Click to view

Cyber Security Future Trends: The exponential growth of ICT integration with all aspects of our economies, governance and personal lives means that cyber security is likely to remain crucial to the resilience of the global economy in the next decade. Click to view

Panama follow up Click to view

Who is listening in, and what you can do to stop them. Click to view

Strong encryption for everyone is a national security advantage. Click to view

Reducing Insider Threats pre employment screenings - 28 April 2016 Click to view

Corporate Espionage and Protectng Proprietary Information - 27 April 2016 Click to view

How cops and crooks can 'grab' your cellphone - and you - 27 Nov 2015 00:00 Heidi Swart
Click to view

Man in dock over R25m bugging device (Star 4 August 2015) Click to view

Grabber’ nabbed in big sting (Star 3 August 2015) Click to view

Three held for possessing ‘spy machine’ (Star 3 August 2015) Click to view

SA Spies’ Shopping List (Sunday Times 12 July 2015) Click to view

TSCM Training – Who Needs It? (Intersec June 2015) Click to view

Suspicious of your partner? Bug them. (Sunday Times, 17 May 2015) Click to view

“De-bugging” Partners for 20 Years in Europe & Sub-Saharan Africa (Intersec February 2015) Click to view

Watch and Learn (Intersec) - Covert surveillance threats faced by officials and business leaders travelling abroad. - Click to view

Watching the Watchers (Intersec) - In 2003, the newly launched UK Security Industry Authority (SIA) began the process of regulating and licensing the private security industry - Click to view

Digital Forensics Unlocked (Intersec - October 2014) - With Courts still failing to take advantage of mobile digital forensic evidence, legal systems must accommodate and embrace this data to successfully investigate and prosecute terrorists - Click to view

Bugs, Espionage and the Insider Threat (Intersec - October 2014) - How cheap, widely available covert surveillance technology is making corporate espionage by employees an increasingly urgent threat. - Click to view

Protect your intellectual property and trade secrets against the imminent threat of corporate espionage. The reality of focussed communication breaches. - Click to view

How can I tell if my mobile phone is tapped. Mobile spy and cellular bugging - Click to view

The digital spies are watching you It's time to fight for you. - Click to view

Hack turns the Cisco phone on your desk into a remote bugging device No fix yet for attack that allows eavesdropping on private conversations. - Click to view

YOUR Cisco VoIP phone is easily TAPPED, warns CompSci prof Eavesdrop on calls using kernel security bug - Click to view

29C3: Big bugging with Cisco VoIP phones At the 29C3 hacker congress in Hamburg, security researchers from Columbia University have demonstrated that the microphone in the receiver of internet-based Cisco phones can be turned into a remotely controlled listening device. - Click to view

Popular office phones vulnerable to eavesdropping hack, researchers say This small gadget can be attached to a single Cisco IP phone and turn an entire company’s network into a sophisticated bugging device within seconds, researchers say. - Click to view

Serious flaw allows Cisco IP phones to be used for spying Researchers have demonstrated how a serious vulnerability in the 7900 series of the Cisco (NASDAQ: CSCO) Unified IP Phones can be used to transform them into bugging devices in order to eavesdrop on private conversations. - Click to view

The hunt for Red October: five-year cyber espionage campaign uncovered. A Russian cybersecurity company issued a report on Monday saying that it had identified a sophisticated cyber espionage campaign that has been in operation since 2007. - Click to view

Knick deploy high-tech mics to record Carmelo Anthony’s on-court chats League sources have confirmed Knicks owner James Dolan, in the wake of the highly volatile trash-talking war between star Carmelo Anthony and the Celtics’ Kevin Garnett last week, ordered two technicians to hold high-tech, sensitive microphones at opposite ends of the Madison Square Garden court to record all in-game conversations by and around his star. - Click to view

PM hints at ‘nearby’ figures for bugging Prime Minister Recep Tayyip Erdoğan has hinted that “those physically close to him” might have been responsible for alleged wiretapping but stopped short of detailing whether or not his bodyguards are suspected of the eavesdropping. - Click to view

Speculations mount over PM’s wiretapping Fingers continue to be pointed as speculation grows in Ankara over who is responsible for wiretapping the prime minister - Click to view

FBI's Desire to Wiretap Every New Technology Makes Us Less Safe Here they go again. Every year or so we end up writing about the FBI's desire for better wiretapping capabilities for new technologies, such as Skype. Basically, the FBI argues that because "bad guys" might use those tools to communicate in secret, they need backdoors to make sure that they can keep tabs on the bad guys. - Click to view

The FBI Needs Hackers, Not Backdoors Just imagine if all the applications and services you saw or heard about at CES last week had to be designed to be “wiretap ready” before they could be offered on the market. Before regular people like you or me could use them. - Click to view

DA: County controller under investigation for wiretapping Luzerne County Controller Walter L. Griffith Jr. is under criminal investigation for illegally recording dozens of conversations over the last two years, District Attorney Stefanie Salavantis told The Citizens' Voice, a Times-Shamrock newspaper. - Click to view

Special wiretap search team to be formed for Turkish PM The Prime Ministry's team of bodyguards is set to form a new security branch, following the discovery of illegal bugs in Prime Minister Recep Tayyip Erdoğan's offices, daily Milliyet has reported. - Click to view

"Debugging" Corporate Aircraft Blake Technical Limited carry out comprehensive TSCM electronic countermeasure searches specifically geared for Corporate Aircraft. - Click to view

Wiretapping and Other Eavesdropping Devices and Methods Wiretapping and electronic eavesdropping are virtually as old as the telephone. - Click to view

The Secret War Foreign spies hack computers to bleed billions from industry and steal military secrets. - Click to view

Hacked to Death Is hacking wicked and antisocial, or cool and geeky? A brief history of tech's most two sided term. - Click to view

Did News Corp. properties break any U.S. laws? Editors at the New York Post pulled junior staffers into two closed-door meetings on Tuesday and told them, "We have to be on our P's and Q's and not engage in any kind of obvious, unethical journalistic things," according to a source close to the Post. - Click to view

Britain admits to Cold War-style espionage using fake rock LONDON — In a rare acknowledgment of espionage reminiscent of the Cold War, a former British government official admitted that a fake rock discovered in 2006 by the Russian FSB secret service in a Moscow park concealed a listening device planted by British spies. - Click to view

Advanced Corporate Solutions

Specialists in Technical Surveillance Counter Measures (TSCM) services for complete peace of mind.

Follow Us
Contact Us
  • First Floor, Building 16, CSIR, 627 Meiring Naudé Road, Brummeria, Pretoria, Gauteng, South Africa, Gate 3,
  • S25 44.874, E028 16.523

  • Tel: +27 (0) 12 349-1779 / 83
  • Riaan: +27 (0) 82-491-5086
  • riaan@acsolutions.co.za