counter the risks of corporate espionage – and protect your ... · surveillance and electronic...

Post on 09-Aug-2020

10 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

www.hillardheintze.com

Commercial secrets worth tens of billions of dollars have been stolen from companies in recent years as a result of economic and corporate espionage and information theft. And these losses don’t account for unreported or undetected thefts – or the cost of diminished brand value. Don’t underestimate the risks of illegal wiretapping, audio surveillance and electronic eavesdropping.

What information is most valuable to you? Maybe it’s your long-term business strategy, or your negotiating plan for your next corporate acquisition. Perhaps it’s inside information that could impact your stock price or board-level discussions on executive compensation. Hillard Heintze TSCM experts can help you integrate electronic surveillance into your broader corporate security or counterintelligence strategy.

TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM)

Counter the risks of corporate espionage – and protect your intellectual property, brand and the confidentiality

of your boardroom.

For more information, contact:

30 South Wacker Drive, Suite 1400Chicago, Illinois 60606

© 2017 HILLARD HEINTZE LLC 170804

Howard Fisher, Esq.Senior Vice President Strategic Relationshipshoward.fisher@hillardheintze.com312-229-9882

John OrloffSenior Vice President Security Risk Managementjohn.orloff@hillardheintze.com312-229-9828

SCOPE OF SERVICES – SECURITY RISK MANAGEMENT

Why Our Clients Value These Services•• Ability to detect, remove or neutralize a wide range of hostile penetration technologies

•• Flexibility in sweeping facilities in advance of key meetings – or conducting “live monitoring”

•• Greater assurance among senior leaders and attorneys that critical discussions and information is confidential and protected

Technical Surveillance Countermeasure (TCSM) Sweep

Comprehensive physical and electronic search of areas of concern by highly trained experts and technicians.

Use of multiple means to examine a room’s physical structure, furnishings and content; detect the presence of audio surveillance devices; and identify security weaknesses that could allow a technical penetration or eavesdropping.

Application of sophisticated, laboratory-grade technical equipment to discover powered devices, locate transmitters and identify resident RF signals to determine if sensitive information can be compromised.

Routine Screening: Systematic, schedule-based TSCM sweeps of locations where information is at the highest risk.

Random or Threat-Specific Screening: Ad hoc TSCM sweeps when circumstances warrant or intelligence dictates.

Live Monitoring: Continuous, on-scene electronic monitoring and surveillance during special events.

Where to Sweep

Areas requiring assurance that any and all conversations and business meetings remain privileged and confidential. Corporate Locations

• Executive Offices

• Boardrooms

• Conference Rooms

• Control Rooms

• Research, Development and Engineering Sites

Off-Site Meetings

• Board Meetings and Executive Retreats

• Leadership Planning and Strategy Discussions

Private Residences

Corporate Cars and Aircraft

top related