Skip to content

STAGING TSCM ACTIVITY

In this article, I would like to separately touch on two topics – the preliminary or preparatory stage when searching for bugs, unauthorized channels for information risks, countering unauthorized receipt of information, and also possible ways to identify installations for reconnaissance equipment.

Preliminary stage

As I wrote above, our work is somewhat reminiscent of the work of a doctor. And as a result, we also have cases that can be classified into simple, complex, impossible, and “I don’t understand how this happened.”

So, as my experience of observing the work of my colleagues has shown, and also in different countries, very little attention is paid to the preparatory stage. However, the overall result of our work largely depends on the correct and complete implementation of this stage. I would like to dwell in detail on each type of work during the preparatory stage and the main mistakes during this process.

Preparatory stage for bugs inspection

As I mentioned above, we are in absolutely unequal conditions with our opponents, so we are obliged to use every opportunity to add an advantage to ourselves. And vice versa – refusal or improper performance of this work complicates our subsequent work.

From my experience, as well as from the experience of my opponents (with whom I can talk about this), if it is possible not to get as close as possible to the source of information, then this opportunity should be used first. I mean – if it is possible to obtain information without entering the room or without using the subject’s personal belongings, then first of all you need to use this method. This means that, first of all, the detection of eavesdropping, spying or simply recording (including the condition or movement of the subject) devices should begin not at the object indicated for examination, but at the approaches to it. If there is a possibility (there are cases that you, an accompanying person, or even the subject of the study himself do not have such an opportunity), then we are obliged to begin our work by developing a map with possible locations for installing stationary or mobile centers for receiving and processing information. There have been cases, and in my practice there have been several, when a simple walk around the territory and adjacent buildings gave us the opportunity to identify such posts – and even, by following them, obtain information about how they conduct covert audio and video surveillance.

If your object under study is equipped with video surveillance systems, alarm systems, access control systems and time and movement tracking systems, you are required to gain access to them, inspect it them and, most importantly, do an analysis. As a rule, access to an object for a specialist installing means of collecting information is provided either by employees of this object, or by services that in one case or another gain access to it (firefighters, miners, service services, lost people, etc. ) .

Secondly, but not unimportantly, you are obliged to examine objects that are located nearby or have common communications (including personnel – it sounds paradoxical, but in my practice there is a case when we identified a drive from a hidden video camera in a room, personnel for servicing an aquarium , which was located on the Client’s premises. The search for a video camera in this case was already a formality – the work was completed before it began). Professional equipment for covert recording of audio and video information may be located far from the installation site – and as a result, its detection can give greater results than identifying the microphone or hidden camera itself. In addition, modern microphones are so sensitive that there is no need for a through hole in the wall; it is enough not to reach the through hole of 6-8 mm. This means that neither visually nor technically the volume of the object will not contain a reconnaissance device. By the way, I will describe several detection methods and such devices in the Technical Support section of this and subsequent articles. So, dear colleagues, especially those who evaluate their work by the volume of the object being inspected – remember that your object also has external sides and connected communications, as well as personnel who can potentially bring in, install, accompany, camouflage and in the event of a threat detection – deactivate or destroy the equipment.

Technical support

For reasons known to you, I, as a TSCM specialist, do not currently have access to my equipment. Therefore, I decided to describe, step by step, the most effective of my and familiar equipment. You will learn that there are other manufacturers besides REI, and when we overtly rely on technology and when we don’t use it 100%.

In this article I want to talk to Let’s talk about the simplest visual – optical detection method using UV lamps.

My kit always contains several UV lights and a UV spotlight. Practice shows that it is 365nm UV diodes that show their effectiveness.

Ultraviolet light 365 nm is suitable for almost any purpose, except for searching for amber and some other specific tasks.

365nm ultraviolet LED lights used for?

  • search for hidden fluorescent marks and images on banknotes, securities and government forms;
  • detecting leaks of freon and other refrigerants in closed systems of various equipment;
  • magnetic particle and capillary flaw detection;
  • detection of traces of various biological substances;
  • identification of hidden marks, for example, anti-theft markings on cars;
  • for irradiation of light-curing materials (adhesives and varnishes);
  • control of visitors to nightclubs, restaurants and other public institutions (by means of previously placed tags using ultraviolet stamps);
  • for nightclubs – detection of traces of drugs on the hands of visitors

What is ultraviolet with a wavelength of 365 nm, and its difference from 395 nm

The main difference between 365 nm UV light and 395 nm UV light is the shorter wavelength (which has higher energy), which in practice makes it possible to detect smaller fluorescent elements, which makes the results of a special test or analysis more reliable.

In addition, most reagents and dyes glow most brightly at 365 nm.

And yet, with 395 nm flashlights, the light has a bright purple tint, which, unlike the dim and white light of 365 nm flashlights, cannot clog the fluorescence of substances.

But the most important advantage of this type of light is that a member of the search team can clearly detect places where special equipment can be installed, since heterogeneity will be clearly visible in this light. This is due to the fact that, having high energy, optical light of a given wavelength highlights the use of materials for the camouflage, and even just the same material, but with pain late use. We found this method (and suggested it) back in 2013, but in practice it is still relevant today. I also have 6W spotlights in my arsenal, but with significant power, the amount of dispersion is significant, which in a practice is not very convenient. In addition, do not forget that this reflected light is very danger to the eyes. So use this method with proper protection for your eyes. In addition, do not forget to illuminate with this light best in conditions of minimal lighting and use this light not only for walls and permanent structures, but also for interior elements.

In your set of optical detection tools, it is useful to have, of course, a set of several types of light, as well as filters. Light filters can easily be found in photographic equipment, but IR lighting must be fixed to the camera – in practice it is more effective. Don’t forget about the laser – especially in red and green. I will not claim that these methods are new or particularly effective, but all the same, this gives us a chance to successfully detect the installation location.