Services

The essence of TSCM lies in safeguarding privacy and confidentiality. In both personal and corporate settings, privacy is a fundamental right and crucial for upholding individual freedom and corporate integrity. TSCM guarantees that private conversations—concerning sensitive personal issues or critical business strategies are protected from external eavesdropping and surveillance, ensuring security and trust.


MoKan’s approach to TSCM services begins with determining the best point of contact, whether you, an internal security team, or an outside consultant. This ensures streamlined communication and effective coordination. We conduct a comprehensive threat assessment to identify specific vulnerabilities. Areas of concern include leaks of proprietary information, recent high-level executive changes, ongoing or upcoming mergers, new product or pricing developments, and significant organizational changes that could impact the economy or public safety.


Maintaining confidentiality is crucial. To ensure the process remains discreet and sensitive, we limit the awareness of the TSCM engagement to you, any third party involved, and an onsite handler. We then define the scope of our engagement, which may include specific floors, employee offices, meeting spaces, and even vehicles or aircraft where private conversations occur.


Timing is flexible and tailored to your needs—whether for a regular compliance sweep or a more urgent matter. To maintain secrecy, we can conduct the sweep during off-hours or right before a significant event. Our cost structure is transparent. We provide a base cost with clear add-ons, and we can customize between hourly billing or a flat fee that includes a predetermined amount of time and resources.


We aim to help protect your organization’s sensitive information with the utmost precision and confidentiality.

CONTACT US

"Protecting your proprietary information isn't just about safeguarding assets; it's about ensuring your organization's privacy, trust, and integrity."


Keith Bowman - Founder of MoKan

Who needs TSCM?

The highest threat for unwanted surveillance is typically during the following:


  • You are a high-profile executive, athlete, or entertainer subject to media scrutiny.
  • Your industry has significant economic impact potential.
  • Your organization deals with highly sensitive products or technologies.
  • Your business is undergoing discussions on expansion or reorganization.
  • Key executives are departing from your organization.
  • New products, pricing strategies, or marketing plans are being developed.
  • There are ongoing labor negotiations or disputes.
  • You are involved in litigation, lawsuits, or other civil actions.

Where is TSCM Implemented?

Our primary mission is to ensure the utmost protection and security of your privacy and communications. We offer comprehensive services, including Counterespionage, Technical Surveillance Countermeasures (TSCM), Site Surveys, TSCM Consulting, physical security, and Technical Bug Sweeps. We deploy our services in the following locations.


  • Boardrooms/Conference Rooms
  • Locker Rooms/Bathrooms
  • CSuite Areas
  • Executive Home Office
  • Corporate Transportation
  • Hospitality & Offsite Travel
  • Private Meeting Spaces

What TSCM methods does MoKan use?

MoKan employs various sweep methods during engagements to comprehensively assess and address potential security vulnerabilities that could arise from different types of surveillance or eavesdropping devices. Each method targets different aspects of surveillance and eavesdropping risks, and together, they ensure a holistic examination of our client's environment. By using these diverse techniques, MoKan is highly assured that the target area is free from unauthorized surveillance and secure for sensitive activities.


Physical Inspection: This is the foundational step, during which the technician physically searches the environment for any signs of tampering, unusual items, or unauthorized modifications. It's crucial because some surveillance devices can be hidden in plain sight or embedded within everyday objects.


Thermal Emission Checks: Thermal imaging helps detect heat emitted by electronic devices. This technique is used to uncover hidden devices that may not be detectable by RF or NLJD methods, especially if these devices are embedded within structures or furniture.


Radio Frequency (RF) Analysis: RF analysis detects active transmitting devices by scanning for signals across a spectrum of frequencies. This method is vital for identifying wireless devices transmitting confidential information out of the premises, such as bugs, hidden cameras, or illicit Wi-Fi devices.


Non-Linear Junction Detection: Using a Non-Linear Junction Detector (NLJD) allows the technician to locate electronic components, whether these are actively transmitting or not. This is particularly important for finding devices currently turned off but could be activated remotely or devices hidden in less accessible areas.


Telephone and Wiring Checks: Analyzing telephone systems and wiring ensures no taps or modifications could be used for eavesdropping. This includes checking for devices that could record or transmit conversations through telecommunication lines, a common long-term surveillance method.


Acoustic Leakage Check: This method assesses how sound travels through and out of an area. It helps identify weak points where unauthorized listeners could overheard sensitive conversations, ensuring that verbal information remains confidential within designated spaces.


Data Review and Analysis: Comprehensive data review and analysis are essential for understanding the nature of any detected signals or devices. This helps distinguish between harmless and potentially harmful devices, facilitating informed decision-making about mitigation measures.

MoKan specializes in TSCM inspections for corporate and private aircraft, providing unmatched protection against technical eavesdropping threats. All aircraft, whether leased, fractional, or corporate, are vulnerable to such attacks. Trust MoKan to secure your in-flight communications.