NCJ Number
28681
Journal
Assets Protection Volume: 1 Issue: 1 Dated: (SPRING 1975) Pages: 35-39
Date Published
1975
Length
5 pages
Annotation
THIS ARTICLE IS DESIGNED TO ACQUAINT THE SECURITY DIRECTOR WITH BASIC TECHNICAL SURVEILLANCE TECHNIQUES AND TO PROVIDE A BASIS FOR AN ASSESSMENT OF THE QUALITY OF OUTSIDE TECHNICAL SECURITY SERVICES TO BE CONTRACTED.
Abstract
SIX POSSIBLE METHODS OF TECHNICAL ATTACK ARE EXAMINED: MECHANICAL, MICROPHONE AND WIRE FREE SPACE TRANSMITTERS, CARRIER CURRENT TRANSMITTERS, VISUAL/OPITCAL, AND TELEPHONE. THE USE OF EACH OF THESE METHODS IS OUTLINED. FOUR STEPS IN A TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM) PROGRAM ARE OUTLINED: AND ANALYSIS OF POSSIBLE THREATS TO SECURITY, PREVENTION OF POSSIBLE ATTACKS (ISOLATION), PREVENTION OF EXISTING ATTACKS FROM PROVIDING USEFUL INFORMATION (NULLIFICATION, AND A PHYSICAL SURVEY TO DETECT THE PRESENCE OF TECHNICAL SURVEILLANCE. SUGGESTIONS ARE OFFERED ON THE USE OF TSCM EQUIPMENT AND PURCHASE OF TSCM SERVICES. IN BOTH CASES, THE AUTHOR WARNS THE SECURITY DIRECTOR TO BEWARE OF UNNECESSARY EXPENDITURES AND FRAUDULENT CONTRACTORS.