>From - Sat Mar 02 00:57:26 2024
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Received: by 10.100.205.1 with SMTP id c1mr353370ang.2.1254519922261; Fri, 02
Oct 2009 14:45:22 -0700 (PDT)
Date: Fri, 2 Oct 2009 14:45:22 -0700 (PDT)
In-Reply-To: <7.0.1.0.2.20091001181005.1c0bfcd0_at_tscm.com>
X-IP: 173.71.57.214
References: <c254a0cf-6a13-4534-a26f-f1f0334181c7_at_m11g2000yqf.googlegroups.com>
<7.0.1.0.2.20091001181005.1c0bfcd0_at_tscm.com>
User-Agent: G2/1.0
X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0;
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; .NET CLR 1.1.4322;
.NET CLR 2.0.50727),gzip(gfe),gzip(gfe)
Message-ID: <7729b6c4-e73f-4df7-a24b-3dc6c8e94e32_at_l2g2000yqd.googlegroups.com>
Subject: Re: {4284} TSCM stats for Presentation
From: cptkaos <reco..._at_aol.com>
To: TSCM-L Professionals List <tscm-..._at_googlegroups.com>
Hi Jim:
Good points. You're right, my choice of "what percentage of" probably
wasn't the best. Nevertheless, this audience will inevitably ask the
question - how many bugs, how many times and what kind. Of course, the
biggest challenge will always be convincing them that beefing up their
security postures is not wasted money.
Scott LaCagnin
JRS Group
3948 Legacy Dr., #106-112
Plano, TX 75023
phone: 214-923-8762
fax: 972-208-3775
On Oct 1, 5:20 pm, "James M. Atkinson" <j..._at_tscm.com> wrote:
> Analysis of the RF Airwaves, Conductor Audit/Analysis, and a Physical
> Inspection will result in more bug discoveries then any other method.
> The Spectrum Analyzer, Oscilloscope, Flash Light, and Ladder
> Combination has historically been the most beneficial tools to date,
> and easily results in 90 times the devices begin found then all
> other methods/equipment combined.
>
> Be careful in using the "What Percentage of the Time" statistics
> because it varies widely from target to target, and the more valuable
> the target/information the less likely it is that anything short of
> an extremely granular physical search will find it.
>
> Very often an illicit device is not installed, but rather a very
> clever eavesdropper exploits something that it already present, or
> the spy has identified and isolated a vulnerability and is exploiting
> the weakness instead of installing a hostile device.
>
> A better statistic is that a good TSCM person can find a hostile
> devices, or a gaping hole or vulnerability in almost every sweep they
> do. Mind you they may not find a bug, but more often then note they
> can find some gaping holes that need to be patched.
>
> The more secure the premises, the easier it is to find gaping
> holes... or bugs.
>
> -jma
>
> At 02:49 PM 10/1/2009, cptkaos wrote:
>
>
>
>
>
> >All:
>
> >I'm putting together a talk on the illicit eavesdropping threat to
> >corporate America for a group of executives. Basically it will cover
> >the value of TSCM woven into the overall security fabric of a
> >corporation (if one even exists in some cases). I'd like to
> >incorporate some real world stats from practicing TSCM professionals.
> >If you would like to share your experiences, I am looking for:
>
> >Percentage of times an illicit device is discovered during a TSCM.
> >Type of device(s) and general sophistication
> >Where located
> >How discovered (physical search, broadband, spectrum analyzer, TALAN,
> >NLJD, etc.)
>
> >Any input you would like to provide will be greatly appreciated. If
> >there is anything else you would like to include, please feel free.
> >The presentation is in two weeks.
>
> >Thanks in advance.
>
> >Scott
>
> -------------------------------------------------------------------------=
------------------
> James M. Atkinson =
Phone: (978) 546-3803
> Granite Island Group =
Fax: (978) 546-9467
> 127 Eastern Avenue #291 Web: http:/=
/www.tscm.com/
> Gloucester, MA 01931-8008 E-mail: mailto:j...=
_at_tscm.com
> http://www.linkedin.com/in/jamesmatkin=
son
> -------------------------------------------------------------------------=
------------------
> No enterprise is more likely to succeed than one concealed from the
> enemy until it is ripe for execution. - Machiavelli, The Prince, 1521=
- Hide quoted text -
>
> - Show quoted text -
Received on Sat Mar 02 2024 - 00:57:26 CST