When under threat from technical surveillance it is extremely difficult to detect such a threat. If such an attack has taken place, issuspected, or has to be thwarted, the security executive must know what steps to take and what equipment use.The initial steps in confronting a surveillance problem and protecting information begins with physical security of the facility, surveys of vulnerable points, and what counter measure equipment are needed to tackle this threat and protecting information. Our experts advise on vulnerability assessment, then a counter attack is plannedthen the director must assess who or what is the potential target of attack, how valuable that target is, who is most likely to need that information and what resources they have to launch an attack.