U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

TECHNICAL SUREVILLANCE - SOME BASIC CONSIDERATIONS

NCJ Number
28681
Journal
Assets Protection Volume: 1 Issue: 1 Dated: (SPRING 1975) Pages: 35-39
Author(s)
W WARD
Date Published
1975
Length
5 pages
Annotation
THIS ARTICLE IS DESIGNED TO ACQUAINT THE SECURITY DIRECTOR WITH BASIC TECHNICAL SURVEILLANCE TECHNIQUES AND TO PROVIDE A BASIS FOR AN ASSESSMENT OF THE QUALITY OF OUTSIDE TECHNICAL SECURITY SERVICES TO BE CONTRACTED.
Abstract
SIX POSSIBLE METHODS OF TECHNICAL ATTACK ARE EXAMINED: MECHANICAL, MICROPHONE AND WIRE FREE SPACE TRANSMITTERS, CARRIER CURRENT TRANSMITTERS, VISUAL/OPITCAL, AND TELEPHONE. THE USE OF EACH OF THESE METHODS IS OUTLINED. FOUR STEPS IN A TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM) PROGRAM ARE OUTLINED: AND ANALYSIS OF POSSIBLE THREATS TO SECURITY, PREVENTION OF POSSIBLE ATTACKS (ISOLATION), PREVENTION OF EXISTING ATTACKS FROM PROVIDING USEFUL INFORMATION (NULLIFICATION, AND A PHYSICAL SURVEY TO DETECT THE PRESENCE OF TECHNICAL SURVEILLANCE. SUGGESTIONS ARE OFFERED ON THE USE OF TSCM EQUIPMENT AND PURCHASE OF TSCM SERVICES. IN BOTH CASES, THE AUTHOR WARNS THE SECURITY DIRECTOR TO BEWARE OF UNNECESSARY EXPENDITURES AND FRAUDULENT CONTRACTORS.