Overview

QCC Cyber TSCM services are designed to provide government level protection from cyber eavesdropping. Our cyber TSCM services can detect and locate data eavesdropping attacks and cyber backdoors against, servers, PC’s, printers, LAN’s, WAN’s, Building Management systems (BMS) and Supervisory Control And Data Acquisition (SCADA) systems. We work in data centres, IT rooms, plant rooms and anywhere IT systems are vulnerable to attack.

All QCC cyber TSCM services are fully ISO certified and provide a wide range of options to match all client needs.

Cyber eavesdropping / cyber TSCM threat briefings

QCC deliver FREE cyber eavesdropping services threat briefings to either government officials, company directors / executives or IT / Security Managers. These briefings will provide the audience with a clear understand the threat of and what can be done to counter it with cyber TSCM services.

The briefings examine the origins of attacks, how they apply to the audience’s organisation and what can be done to mitigate or manage the associate risk. The speaker will also dispel any speculation, myths, smoke and mirrors about cyber eavesdropping / cyber TSCM and the reality of what can and can’t be detected. At the end of the briefing the audience are welcome to ask any questions either strategic or technical and the speaker will happily provide answers.

Contact us for further advice or view some of our cyber TSCM services case studies.

Cyber eavesdropping risk assessments

QCC can conduct a risk assessment to see if your organisation is at risk from cyber eavesdropping attack and if yes to what level. The results from the risk assessment can then be used to plan a targeted, risk-based approach to any cyber TSCM services inspection programme which needs to be implemented.

Strategic cyber TSCM services programme setup advice

QCC can offer two solutions for cyber TSCM services programme strategy as follows:

Option1
QCC can advise on the setting up and running of an inhouse cyber TSCM services / cyber counter-eavesdropping department / programme including providing all equipment, training your own staff and ongoing support including perpetual threat update training.

Option 2
QCC can advise on a cyber TSCM programme strategy and scope and then act as the provider of the capability as a fully managed service.

Contact us for further advice or view some of our cyber TSCM services case studies.

Cyber TSCM inspections / Cyber counter-eavesdropping sweeps

QCC provides a full range of cyber TSCM inspections / cyber bug sweeps to meet all Client requirements. Our cyber TSCM services options are as follows:

Buildings
Cyber TSCM inspections of all forms of IT systems installed in buildings including offices, data centres, homes, hotels rooms, conference centres, exhibition chalets, factories, laboratories, industrial sites, nuclear sites and Supervisory Control And Data Acquisition (SCADA) controlled sites.

Cars
Cyber TSCM inspections / cyber bug sweeps of cars & other vehicles. This type of inspection is becoming increasingly important as executives often communicate via a vehicles inbuilt data communications system to send/receive emails and other sensitive digital information while traveling in their cars. This type of inspection will also identify any hostile tracking device fitted to a car which is often a precursor to a kidnapping attempt on the principle or a clear indicator that a covert surveillance operation is in progress.

Jets & aircraft
Cyber TSCM inspections / cyber bug sweeps of corporate / private / government airframes. This type of inspection is becoming increasingly popular as jets are often used as mobile offices with the users communicating via the jets inbuilt data communications system to send/receive emails and other sensitive digital information while traveling or while on stand. As jets are often leased or left unsecured on stand they are often vulnerable to cyber technical attacks. Very specialist skills and equipment are required to properly deliver cyber TSCM inspections of an aircraft and the QCC cyber TSCM services teams are highly experienced in this field and use the most advanced equipment available to complete this task to the highest standards.

Superyachts
Cyber TSCM inspections / cyber bug sweeps of privately owned superyachts / chartered superyachts and their respective tenders, launches and support vessels. Cyber TSCM inspections of these types of vessels are common practice for the QCC cyber TSCM services teams as these types of vessel are routinely used to hold sensitive communications, negotiations and contract signing events acting as mobile office HQ’s.

These events are often held off shore in international waters or in tax haven’s where the location of the vessel when the event occurs can have direct relation to the legal and tax jurisdictions which apply to the agreement. Again very specialist skills and equipment are required to conduct cyber TSCM inspections of a superyacht or other vessel and QCC cyber TSCM services teams have the most advanced processes, expertise and equipment available to complete these complex tasks to the highest standards.

Cyber TSCM live monitoring of events

In addition to its cyber TSCM inspections QCC can provide cyber TSCM live monitoring of critical IT systems for the duration of sensitive events. A cyber TSCM inspection and then live monitoring delivers the highest possible assurance that no localised data eavesdropping has occurred or is occurring during the sensitive event. To cyber live monitor for all forms of cyber eavesdropping requires capability and processes unique only to QCC.

Contact us for further advice or view some of our cyber TSCM services case studies.

Permanent cyber TSCM live monitoring systems

When a permanent cyber TSCM live monitoring solution is needed QCC can liaise with the Client to understand the requirements & scope, provide the relevant technical advice and then conduct a site survey and design & install the best solution to meet the Client requirements. Cyber live monitoring systems are often required for Sensitive Compartmented Information Facility’s (SCIF) or secure containers, prisons, embassy’s or other locations where no unauthorised cellular, Radio Frequency (RF) or wireless transmission equipment is permitted.