Technical Counter-Surveillance Tactics (TCST)

Real-world counter-technical training covering RF, BLE, GPS and Wi-Fi detection, taught by active specialists at CDEC Ltd.

Detect, disrupt and document modern surveillance threats.

Course Overview

Modern surveillance isn’t limited to cameras and tails — it’s digital, wireless and invisible. The Technical Counter-Surveillance Tactics course (TCST) prepares professionals to detect and neutralise threats that exploit today’s hybrid environment: RF, optical, BLE, Wi-Fi, GPS and cellular tracking.

Participants learn how adversaries deploy covert transmitters, trackers and data-collection devices — and how to identify, verify and disable. Through live demonstrations and field exercises, the course builds genuine capability in counter-technical operations, blending TSCM principles with modern investigative tradecraft.

What You’ll Learn

  • Fundamentals of RF, optical and magnetic surveillance technologies

  • Threat actor tradecraft and concealment techniques

  • How to detect and locate active transmissions using spectrum analysers and handheld detectors

  • Recognising IoT-based covert devices (BLE/Wi-Fi beacons, GPS trackers)

  • Conducting structured technical sweeps and evidential documentation

  • Integrating findings into wider security and intelligence operations

Why It Matters

Technical surveillance has become cheap, covert and increasingly digital. From corporate espionage to criminal tracking, hostile actors can collect intelligence using devices smaller than a coin. This course gives teams the tools and judgement to recognise these threats early, protect their people and assets, and maintain evidential integrity during counter-operations.

Course Format

  • Duration: 3 days (with optional extended field module)

  • Delivery: In-person practical training (UK & international options)

  • Includes: Live RF demonstrations, sweep exercises, report templates

Who It’s For

  • Corporate and government security teams

  • Protective intelligence and TSCM practitioners

  • Investigators, law-enforcement and defence personnel

  • Executive-protection and risk-management professionals

Ready to equip your team with real technical surveillance countermeasure capability?

Contact CDEC to arrange private TCST delivery for your organisation.

Contact Us
Previous
Previous

Open Source Intelligence Foundations (OSINTF)

Next
Next

Situational Awareness & Threat Recognition (SATR)