Confidential Consultations — By Appointment Only (905) 955-7689
ICUnit
Enforced by Doug Quan
TSCM 101 · 6 min read

What is TSCM? Technical Surveillance Countermeasures Explained

TSCM stands for Technical Surveillance Countermeasures — the professional discipline of detecting, locating, and neutralizing covert audio, video, and tracking devices in vehicles, offices, and other private spaces.

The term originated in government and military intelligence work, where the cost of undiscovered surveillance is measured in lives. Today, the same discipline — performed by qualified private practitioners — protects Ontario law firms, executives, and businesses from a much broader and more accessible threat landscape.

A short history of TSCM

TSCM as a structured discipline emerged during the Cold War, when state actors invested heavily in concealed listening devices and the response capability to find them. For decades it remained largely confined to government and large institutional clients. Two things changed in the last fifteen years:

  • Surveillance equipment became commodity. Devices that once required a state lab now ship from consumer marketplaces.
  • The attacker pool expanded. Hostile parties in litigation, corporate insiders, organized theft rings, and ex-partners now routinely deploy surveillance hardware.

The result: TSCM is no longer a niche capability for governments. It is a baseline service for any organization or professional whose private conversations carry meaningful value.

What a TSCM professional actually does

A serious TSCM engagement combines three layers:

  • Radio frequency analysis. Calibrated spectrum work across the bands actually used by covert transmitters — cellular, Wi-Fi, Bluetooth, and lesser-known industrial bands.
  • Physical inspection. A methodical check of credible hide points, fixtures, and surfaces. Surveillance devices fail to be invisible; they fail to be obvious.
  • Line and infrastructure analysis. Phone lines, network ports, and power infrastructure can carry signals that pure RF work would miss.

What a TSCM professional does not do is publish their equipment list. The integrity of TSCM work depends on adversaries not knowing exactly what is being looked for. Reports document findings and methodology — never the inventory.

Types of surveillance threats in Ontario today

Ontario clients call ICUnit about three broad threat patterns:

  • Vehicle GPS trackers — planted by theft rings (especially on high-value SUVs and trucks), by hostile parties in family law matters, and by corporate adversaries tracking executive movements.
  • Audio bugs in offices — typically tied to litigation, to corporate disputes, or to leaked information that should not have left the room.
  • Hidden cameras — most often in residential matters, but increasingly in workplaces and short-term rentals.

Why Ontario businesses are making TSCM a baseline

Three things have shifted the calculus:

  • The cost of a single leaked boardroom conversation can dwarf the cost of a recurring TSCM program.
  • Insurance and compliance pressure increasingly favours documented operational security work.
  • Clients — particularly in legal, financial, and M&A contexts — increasingly expect the firms they work with to take privacy seriously.

The ICUnit approach

ICUnit operates strictly B2B — law firms, corporate executives, security companies, and fleet operators. Engagements are conducted by Doug Quan, a Canadian Armed Forces veteran, Licensed PI under the Ontario PSISA, and MESA RF / TSCM Certified specialist.

Every engagement produces a confidential written report you can act on. We do not list pricing publicly because every engagement is genuinely custom. To start a confidential conversation, call (905) 955-7689 or email donovan@icunit.ca.

Schedule Your Confidential Consultation

All consultations are strictly confidential. We come to you, anywhere in Ontario.

(905) 955-7689

Imperial Consulting Unit Inc. — Aurora, Ontario · Serving all of Ontario