Technical Counter-Surveillance Tactics (TCST)
Detect, disrupt and document modern surveillance threats.
Course Overview
Modern surveillance isn’t limited to cameras and tails — it’s digital, wireless and invisible. The Technical Counter-Surveillance Tactics course (TCST) prepares professionals to detect and neutralise threats that exploit today’s hybrid environment: RF, optical, BLE, Wi-Fi, GPS and cellular tracking.
Participants learn how adversaries deploy covert transmitters, trackers and data-collection devices — and how to identify, verify and disable. Through live demonstrations and field exercises, the course builds genuine capability in counter-technical operations, blending TSCM principles with modern investigative tradecraft.
What You’ll Learn
Fundamentals of RF, optical and magnetic surveillance technologies
Threat actor tradecraft and concealment techniques
How to detect and locate active transmissions using spectrum analysers and handheld detectors
Recognising IoT-based covert devices (BLE/Wi-Fi beacons, GPS trackers)
Conducting structured technical sweeps and evidential documentation
Integrating findings into wider security and intelligence operations
Why It Matters
Technical surveillance has become cheap, covert and increasingly digital. From corporate espionage to criminal tracking, hostile actors can collect intelligence using devices smaller than a coin. This course gives teams the tools and judgement to recognise these threats early, protect their people and assets, and maintain evidential integrity during counter-operations.
Course Format
Duration: 3 days (with optional extended field module)
Delivery: In-person practical training (UK & international options)
Includes: Live RF demonstrations, sweep exercises, report templates
Who It’s For
Corporate and government security teams
Protective intelligence and TSCM practitioners
Investigators, law-enforcement and defence personnel
Executive-protection and risk-management professionals