CASE STUDIES

THE COAST IS CLEAR, PUT THE DEVICE BACK - Mobile tablet used eavesdropping - Fact or Fiction - Read More

THE BUGGING WARS MARCHES ON - And you thought spy stories were a thing of the past - Read More

The reality of Cyber Espionage in South Africa - A Case Study of cyber infiltration in the Bugging/Listening devices environment - Read more

Cellebrite - Fifteen million mobile devices are infected with malware, and most of those run Android, according to a new report by Alcatel-Lucent's Kindsight Security Labs.- Read More

Why TSCM is necessary - Read More

10 Methods of preventing mobile malware - Read More

Surviving the Digital Swarm Your privacy is a cloud of data scattered on servers that are beyond your control. - Read More

Lessons learnt from the Wikileaks fiasco There are 3 important homeland security lessons that you and your organisations should take to heart from the Wikileaks situation. - Read More

Disgruntled Employee This was the scene of where the disgruntled employee left all the traces of eavesdropping equipment. - Read More

NEWS ARTICLES


The 4 Pillars
for the Protection of Intellectual Property Read more

MESA. Advanced Corporate Solutions (ACS) is pleased to inform you that added to our most modern TSCM (Technical Surveillance Countermeasures) equipment from this year, is the MESA. We are the only TSCM service provider in Africa with this most recent equipment. The protection of Intellectual Property has never been as important as it is currently.When last did your organisation conduct a formal TSCM “Debugging” Assessment? Read More

HOW TECHNOLOGY FUELS THE "BUGGING NIGHTMARE - "Modern technology and society’s constant connection to the Internet allows more creativity in business than ever before – including the black market. Criminals are carefully discovering new ways to tap the most sensitive networks in the world. - Read More 

CELLEBRITE - Advanced Mobile Device and Digital Forensics - Read More

SMART HOMES - Protecting Company Owned Data at Home - Read More

Is your TSCM “Debugging” Programme in place? There is a relatively simple answer to dramatically improving both the Probability of Detection (POD) and the Probability of Intercept (POI) from a TSCM perspective. Read More

TSCM "Debugging" - Technical Security reality during COVID19. In the midst of the Covid 19 Pandemic, one of the preventative measures we can adopt is working from home. In an increasingly connected world we can continue our professional work from remote locations, and in the safety of our own homes. This however poses new and significant threats to our organisations and the safeguarding of our Intellectual Property. It is now becoming more important than ever, to not only take care of our personal, but also our information security hygiene. Read More

Industrial Espionage. One third of Swiss companies are spied on. Read More

In the Era of Hacking, Bugs Remain a Critical Espionage Threat. The threat of cyber attacks has garnered a lot of publicity in recent years — and rightfully so, as such hacks provide hostile actors with a powerful and convenient intelligence tool. Read More

TSCM and Penetration Testing. When discussing Technical Surveillance Countermeasures with people who are not very familiar with what is involved, they often ask if (or assume) our work is a part of cyber security or even that we are perform pen-testing services. Read More

TSCM vs Insider Threat - 2020. We just want to thank all Valuable Clients for their ongoing support during the past 25 Years. Read More

When did you last debug your office? How can you tell if someone is bugging or tracking you? Read More

Advanced Corporate Solutions

Specialists in Technical Surveillance Counter Measures (TSCM) services for complete peace of mind.

Follow Us
Contact Us
  • First Floor, Building 16, CSIR, 627 Meiring Naudé Road, Brummeria, Pretoria, Gauteng, South Africa, Gate 3,
  • S25 44.874, E028 16.523

  • Tel: +27 (0) 12 349-1779 / 83
  • Riaan: +27 (0) 82-491-5086
  • riaan@acsolutions.co.za