NCJ Number
47396
Journal
SECURITY GAZETTE Volume: 20 Issue: 3, Dated: (MARCH 1978) Pages: 84-89
Date Published
1978
Length
6 pages
Annotation
INDUSTRIAL ESPIONAGE UTILIZING TECHNICAL SURVEILLANCE OF A TELECOMMUNICATIONS NETWORK OR ON-LINE COMPUTER SYSTEM IS DISCUSSED WITH PARTICULAR EMPHASIS ON SECURITY COUNTERMEASURES NECESSARY TO COMBAT IT.
Abstract
TECHNICAL SURVEILLANCE PROVIDES A COMPETITOR WITH THE EASIEST AND MOST ANONYMOUS METHOD OF OBTAINING PRIVATE INFORMATION. ELECTRONIC SURVEILLANCE MAY UTILIZE SIMPLE RECORDING DEVICES OR VERY SOPHISTICATED TECHNIQUES TO PICK UP PRIVATE COMMUNICATIONS, WHICH IN THE HANDS OF COMPETITORS COULD RESULT IN LARGE LOSSES TO COMPANIES THAT FAIL TO TAKE ADEQUATE COUNTERMEASURES. A TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM) SURVEY WILL USUALLY INVOLVE AN ELECTROMAGNETIC FREQUENCY SPECTRUM SEARCH TO IDENTIFY CLANDESTINE LISTENING DEVICES, A CARRIER CURRENT TEST OF THE RING MAIN, AND A COMPREHENSIVE LOGGING OF ALL INTERCEPTED FREQUENCIES, BOTH LEGITIMATE AND OTHERWISE. A THOROUGH ELECTRONIC AND PHYSICAL ANALYSIS OF THE ENTIRE TELECOMMUNICATIONS NETWORK WITHIN THE SENSITIVE AREA IS THEN CARRIED OUT WITH EMPHASIS ON DEDICATED LINKS TO THE MAIN EXCHANGE. A COMPUTER COMPLEX MAY ALSO BE DISABLED, DISRUPTED, OR MONITORED, OR HAVE ITS INFORMATION ALTERED BY REMOTE TECHNICAL MEANS. AN ELECTROMAGNETIC PROFILE SURVEY MAY BE CONDUCTED TO DOCUMENT ANY INTENTIONAL OR UNINTENTIONAL INDUCED RADIATION WITHIN THE ENTIRE COMPUTER COMPLEX CREATED BY RADIO FREQUENCY OR ELECTROMAGNETIC EMANATIONS ORIGINATING FROM UNKNOWN SOURCES. A BUSINESS CONSIDERING USING THE SERVICES OF A TSCM ORGANIZATION SHOULD CAREFULLY ASCERTAIN THE ORGANIZATION'S INTEGRITY, COMPETENCE, AND HONESTY. THE ORGANIZATION'S CREDENTIALS AND PROFESSIONAL STANDING SHOULD BE CHECKED, CONTACT SHOULD BE CONDUCTED IN PERSON, AND AN EQUIPMENT LIST SHOULD BE OBTAINED. BOTH THE TECHNICAL AND PHYSICAL SURVEYS SHOULD BE COMPREHENSIVE, AND A COMPLETE REPORT OF SURVEY FINDINGS AND RECOMMENDATIONS SHOULD BE SUBMITTED ON COMPLETION OF THE SURVEY. IF AN IN-HOUSE TCSM TEAM IS NEEDED, AT LEAST TWO RECENTLY TRAINED AND FULLY QUALIFIED TECHNICAL PERSONNEL AND A CONSIDERABLE CAPITAL OUTLAY FOR QUALITY SURVEILLANCE DETECTION EQUIPMENT WILL BE REQUIRED. THE COMMERCIALLY AVAILABLE 'BUG' DETECTORS, OPERABLE BY NONTECHNICAL PERSONNEL, HAVE LIMITED CAPABILITIES; THEIR UTILITY WILL DEPEND ON THE NEEDS AND THE VALUE OF INFORMATION AT RISK OF OUTSIDE SURVEILLANCE. (JAP)