Professional Documents
Culture Documents
Future of TSCM
Future of TSCM
Vision
_________________________________________________________________________
The
Future
of
TSCM
“Innova'on
&
Insight”
Eavesdropping
_________________________________________________________________________
Eavesdropping
dates
back
to
1370
and
was
punished
by
the
BriHsh
courts
of
the
Hme.
In
the
late
middle
ages,
English
village
courts
tried
to
maintain
equilibrium
by
imposing
punishment
for
eavesdropping,
scolding
and
nocHvagaHon
(aimless
night
wandering).
The
term
"eavesdropping"
originally
came
from
Anglo-‐Saxon
laws
against
building
too
close
to
the
border
of
your
land,
lest
the
rain
running
off
your
roof,
the
yfesdrype
or
"eaves
drip,"
mess
up
your
neighbour's
property.
"Eavesdropper"
became
the
word
for
a
person
who
stands
within
range
of
the
eaves
drip
—
too
close
—
in
order
to
listen
in
on
what
was
going
on
inside
the
house
21st
Century
_________________________________________________________________________
•
New
global
world
issues
•
New
technology
1
PuMng
Things
in
Context
_________________________________________________________________________
Business
has
always
been
about
compeHHon:
compeHHon
for
customers,
compeHHon
for
markets
and
ulHmately
compeHHon
for
superior
returns!
•
Convergence
• Cyber-‐espionage Link
2
The
Internet
of
Things
_________________________________________________________________________
hep://www.youtube.com/watch?v=LVlT4sX6uVs
Technology
PredicEons
_________________________________________________________________________
1. Zero-‐size
intelligence
–
chips
becoming
smaller
2. Neuro
hacking
-‐
decoding
brainwaves
3. Mass
data
-‐
data
and
machines
could
replace
individual
decision
making
4. Youth
Tech
Movements
5. Nanotechnology
–
innovaHons
in
technology,
engineering,
medical
devices,
“surveillance
devices”
6. More
cyber
aeacks
–
water
systems
and
electronic
grids
7. Universal
translators
8. RoboHcs,
surrogates
and
avatars
(digital
representaHon
of
a
real
person)
3
What
Is
TSCM
_________________________________________________________________________
It
is
the
systemaHc
electronic,
physical
and
visual
examinaHon
of
a
designated
area
by
trained
and
q u a l i fi e d
p e r s o n s ,
u H l i s i n g
appropriate
equipment
and
techniques
in
an
effort
to
locate
surrepHHous
listening,
video
and
opHcal
devices,
security
hazards
o r
o t h e r
m e a n s
i n
w h i c h
classified,
sensiHve
or
proprietary
informaHon
could
be
intercepted,
lost
or
stolen
Source
:
Tim
Johnson
(Adapted
by
S
Whitehead)
©
2014
info@tscm-‐za.com
www.tscm-‐za.com
TSCM
Angle
_________________________________________________________________________
•
Eavesdropping
detecHon
(Debugging)
•
VIP
protecHon
programmes
•
InformaHon
security
©
2014
info@tscm-‐za.com
www.tscm-‐za.com
4
ASack
methods
_________________________________________________________________________
ASack
methods
_________________________________________________________________________
1. InformaHon
about
the
threats
in
all
areas
–
What
are
the
trends?
(SomeHmes
we
are
updated
in
one
area
but
lagging
in
another
area)
2. Good
training
3. The
best
equipment
that
is
available
and
4. To
stay
in
touch
(It
is
all
about
sharing!)
An
Outdated
TSCM
Professional
is
a
Threat
to
His
Clients
and
the
Industry!
©
2014
info@tscm-‐za.com
www.tscm-‐za.com
5
Thank
You!
_________________________________________________________________________
TSCM
Vision
_________________________________________________________________________
6