TSCM – Technical Surveillance Counter Measures

TSCM – Technical Surveillance Counter Measures

Whether you want to protect your information proactively or you think you may have fallen victim to eavesdropping, Athens Dynamic Services with over 15 years of experience provides specialized TSCM (Technical Countermeasures) services and advice to effectively neutralize any threat to your confidential information.

During our in to site visit , the necessary information will be collected in order to understand the problem of each situation and the customer's requirements will be recorded. Then we will carry out a risk assessment proposing the most appropriate course of action tailored to your needs. A comprehensive review will be conducted and, upon completion, our findings will be analyzed in a report, along with our recommendations for further mitigation strategies. If a malicious device is found, we will advise you on the most appropriate course of action regarding the removal of the device and locating the perpetrator.

  • TSCM Security
  • Cyber TSCM

We conduct surveys at the following locations:

  • Office's
  • Meeting Rooms
  • Vehicles
  • Houses
  • Call Centers
  • Call centers
  • Data centers
  • Hotel Rooms
  • Conference and exhibition facilities
  • Critical Infrastructure Areas
  • Laboratories
  • Aircraft and super yachts

Services

TSCM SERVICES

  • Electronic cleaning, tracking and dismantling of monitoring systems and software in any fixed or mobile space (Bug Sweeping)
  • Check on the mobile and gsm - sim card for malicious interventions as well as for the existence of malicious software or monitoring material
  • Detect hidden audio devices with gsm-sim card or micro-transmissions at any frequency, even when it is off or busy (Standby Mode)
  • Blocking wireless networks and frequencies in unauthorized areas and areas (Signal Jamming)
  • Constructions for control and blocking of malicious Drone.
  • Blockage on any remote-controlled explosive device.

CYBER TSCM

  • Internet application security check
  • Information systems infrastructure security control
  • Forensic Investigation
  • Malware Detection Removal & Incident Response
  • Research and collection of open source information for legal entities and individuals (OSINT)
  • Code writing and security of smart contracts (Solidity)
  • Training courses on information systems and information security (Security Awareness)
en_USEnglish
Join our channel