Technical Surveillance Countermeasures (TSCM) vs Insider Threat - 2019. An Insider Threat is a malicious threat to an organisation that emanates from people within the organisation, such as PAs, CPOs, Security Personnel, IT Managers, Employees, Contractors or Business Associates. Read More

ACS TSCM Rogue access points. The insider threat - 2019 should be a year where more importance and focus are placed on information security for businesses than ever before. Viruses and data breaches will continue to present themselves as threats, leading to unplanned downtime, intellectual property loss, andan increase in expenditure, but they won’t be the only ones. Read More

Audit Results: 2017. Advanced Corporate Solutions (ACS), the industry leaders in Technical Surveillance Countermeasures (TSCM) and Electronic Countermeasures Investigations (ECMI), is proud to announce and share the results of our 2017 Technical Surveillance Counter Measures Audit. Read more

TSCM Spectrum Analyser: Now you can have tomorrows TSCM software today. Read More

TSCM - Technical Surveillance Counter Measures: Corporate eavesdropping poses a significant risk to any organization. Global statistics shows that the threat of internal eavesdropping is real and imminent. The statistics also shows that the majority of eavesdropping devices found during “Bug Sweeps” were planted either by current employees, recently terminated employees or associates. Read more

Sports teams need privacy protection. Russian hockey team finds bugging device. Sports teams need to be concerned about privacy and confidentiality.A listening device was apparently discovered in the coaches room of the Russian hockey team, Metallurg Magnitogorsk, at the Ice Palace in St. Petersburg. - Read more

Panama follow up Click to view

How cops and crooks can 'grab' your cellphone - and you - 27 Nov 2015 00:00 Heidi Swart
Click to view

Man in dock over R25m bugging device (Star 4 August 2015) Click to view

Grabber’ nabbed in big sting (Star 3 August 2015) Click to view

Three held for possessing ‘spy machine’ (Star 3 August 2015) Click to view

SA Spies’ Shopping List (Sunday Times 12 July 2015) Click to view

Suspicious of your partner? Bug them. (Sunday Times, 17 May 2015) Click to view

“De-bugging” Partners for 20 Years in Europe & Sub-Saharan Africa (Intersec February 2015) Click to view

Protect your intellectual property and trade secrets against the imminent threat of corporate espionage. The reality of focussed communication breaches. - Click to view

How can I tell if my mobile phone is tapped. Mobile spy and cellular bugging - Click to view

Hack turns the Cisco phone on your desk into a remote bugging device No fix yet for attack that allows eavesdropping on private conversations. - Click to view

YOUR Cisco VoIP phone is easily TAPPED, warns CompSci prof Eavesdrop on calls using kernel security bug - Click to view

29C3: Big bugging with Cisco VoIP phones At the 29C3 hacker congress in Hamburg, security researchers from Columbia University have demonstrated that the microphone in the receiver of internet-based Cisco phones can be turned into a remotely controlled listening device. - Click to view

Popular office phones vulnerable to eavesdropping hack, researchers say This small gadget can be attached to a single Cisco IP phone and turn an entire company’s network into a sophisticated bugging device within seconds, researchers say. - Click to view

Serious flaw allows Cisco IP phones to be used for spying Researchers have demonstrated how a serious vulnerability in the 7900 series of the Cisco (NASDAQ: CSCO) Unified IP Phones can be used to transform them into bugging devices in order to eavesdrop on private conversations. - Click to view

FBI's Desire to Wiretap Every New Technology Makes Us Less Safe Here they go again. Every year or so we end up writing about the FBI's desire for better wiretapping capabilities for new technologies, such as Skype. Basically, the FBI argues that because "bad guys" might use those tools to communicate in secret, they need backdoors to make sure that they can keep tabs on the bad guys. - Click to view

DA: County controller under investigation for wiretapping Luzerne County Controller Walter L. Griffith Jr. is under criminal investigation for illegally recording dozens of conversations over the last two years, District Attorney Stefanie Salavantis told The Citizens' Voice, a Times-Shamrock newspaper. - Click to view

"Debugging" Corporate Aircraft Blake Technical Limited carry out comprehensive TSCM electronic countermeasure searches specifically geared for Corporate Aircraft. - Click to view

The Secret War Foreign spies hack computers to bleed billions from industry and steal military secrets. - Click to view

Did News Corp. properties break any U.S. laws? Editors at the New York Post pulled junior staffers into two closed-door meetings on Tuesday and told them, "We have to be on our P's and Q's and not engage in any kind of obvious, unethical journalistic things," according to a source close to the Post. - Click to view

Britain admits to Cold War-style espionage using fake rock LONDON — In a rare acknowledgment of espionage reminiscent of the Cold War, a former British government official admitted that a fake rock discovered in 2006 by the Russian FSB secret service in a Moscow park concealed a listening device planted by British spies. - Click to view

Advanced Corporate Solutions

Specialists in Technical Surveillance Counter Measures (TSCM) services for complete peace of mind.

Follow Us
Contact Us
  • 1st Floor, HB Forum Building,
    13 Stamvrug Street,
    Val De Grace, Pretoria,
  • Gauteng, South Africa,

  • Tel: +27 (0) 12 349-1779
  • Riaan: +27 (0) 82-491-5086