The proliferation of electronic surveillance devices around the world is undeniable. Billions of dollars of surveillance devices of all types are imported into the United States every year. That begs the question, “Where are all those devices going and what are they being used for?”
There has been an understandable emphasis on “cyber” as the overriding threat in information theft in the past few years but “cyber” only accounts for a portion of the intellectual property, business information, health information, personally identifiable information (PII) and other sensitive information stolen each year. Physical attacks remain a huge threat to protected information which can include “social engineering,” elicitation of information from disgruntled employees, “window spying” (drones) and organizational penetration/infiltration (aka: “embeds”) to name a few. Surprisingly, even “dumpster diving” remains a huge threat in an age when document shredders are readily available at reasonable prices.
This course will inform you regarding the following issues relating to electronic surveillance:
- What it is
- The history and current headlines
- “Denial”, the normalcy bias, and “the toilet paper tube syndrome” – no acknowledgment, no policies, and no countermeasures in place
- Cyber vs. electronic surveillance attacks
- Why electronic surveillance poses such a huge threat
- The importance of merging cyber and physical security
- How electronic surveillance attacks are carried out
- Types of surveillance devices (recorders and transmitters) and emerging threats
- Preventive measures – what you can do to minimize this threat
As is the case with all TSS courses this instruction is customizable and scalable to meet the needs of each client. Contact us for a complementary discussion of your concerns and requirements.