Trainings

Our team of TSCM experts provides a series of specialist courses in various surveillance disciplines.These courses are usually held in Stockholm, Sweden at our training facility or can be held at your premises by arrangement.

Contact us

Our team of TSCM experts provides a series of specialist courses in various surveillance disciplines.These courses are usually held in Stockholm, Sweden at our training facility or can be held at your premises by arrangement. Courses contain practical involvement and are normally held in classes of ten students. We provide all training equipment and facilities. Surveillance training can be tailored and customised to suit your investigative role within your organization.

This is our special training solution. We provide you with a custom made training session specific to your own TSCM equipment that you got through our sales program. We help you understand and use it to its full capacity. This training is for those who have already certified in our stage one and two training but need deeper knowledge about the technical benefits and equipment usage.

Course Description

This three day course is directed at personnel tasked with carrying out physical and technical searches for electronic surveillance and eavesdropping devices. Through presentations and practical exercises the course provides a foundation level knowledge of attack and counter techniques and equipment. The course aim is to provide students with knowledge and skills to be able to make an accurate threat assessment and carry out a low to medium level threat search for eavesdropping devices.

Course Content

  • Conducting threat assessments
  • Radio and modulation theory
  • Analogue and digital techniques
  • Covert audio and video surveillance
  • Covert intercept and eavesdropping of telephone systems, cell phones and computers
  • TSCM techniques and equipment
  • Pre-deployment plans and strategy
  • Reports and recommendations

Course Description

This 5 day advanced course builds on the knowledge gained from the 3 day course with an emphasis on practical, hands-on training in a variety of realistic attack scenarios. The course aim is to provide students with the extensive detailed knowledge and training that will enable them to understand, identify and neutralize a high level/sophisticated threat.

Course Content

  • Sophisticated attack process
  • Advanced physical search techniques
  • Tamper evident labels and seals
  • Advanced features of counter surveillance equipment
  • The radio spectrum and eavesdropping signatures
  • Deep-plant attack and hard-wired microphone installations
  • Disruption techniques
  • Examining residential and office telephone systems and wiring
  • Combating computer hard-disk and media cloning, including key-stroke logging
  • Cell phone and Wi-Fi eavesdropping
  • Advanced techniques to counter GSM/3G technologies
  • Vehicle/transport attack and counter TSCM equipment

Services

Swed Security has a team of foot and mobile operators equipped with specialised covert communication equipment to maximize intelligence gain minimising exposure

Swed Security offers a consulting service with a robust programme of audit of the physical and technical security procedures of businesses or institutions and preventative measures for maintaining competitiveness in an efficient and cost effective manner. 

Data forensics

We work on discovering and analyzing patterns of fraudulent activities to identify specific events involving the movement of money during the course of a crime

Swed Security investigates the presence of electronic “bugs” to avoid chances of falling victim to an eavesdropping attack. Understanding and countering this risk requires experience and knowledge that can only be acquired through years of operational experience within specialist agencies. 

Our trainers will keep your up to date with the latest methods, trends and technologies in both the commercial and government sectors. Specialist training is offered for crisis management planning, covert passive surveillance, covering static as well as Anti Surveillance, Counter Surveillance and Technical Surveillance Counter Measures.

Products