Technical Surveillance Counter-Measures
TSCM beyond Relevant Military Specifications
A primary business of ours, for which hospitality services are merely a marketing vehicle to introduce us to potential clients in our niche markets, pertains to advanced countersurveillance technology. If the associated costs are worthwhile for you, we can provide powerful countersurveillance systems of security for you, your computers, your phone calls, and your E-mail.
Special requests may require participation of a contractor of the US, UK, or Israel with relevant security clearance, and any needed approval would be coordinated by the contractor. Our technologies are only suitable for friendly, lawful, commercial applications. Neither you nor we would want us to provide services to anyone with unfriendly intentions.
Location-Stripped • Seriously Encrypted
Limited free usage of high-security calls and E-mail is available while you are staying with us, including international calls. If your equipment cannot accommodate the necessary configuration requirements, we will work with you for non-encrypted alternatives, such as prepaid mobile phones and/or long-distance calling cards. If possible, we recommend coordinating with us as far in advance as possible, ideally more than two weeks before your travels. Limitations and exclusions apply, particularly pertaining to discounted and promotional rates that are reserved online via consumer travel services. For the sake of efficiency, unless you request otherwise, the complexity of the technical surveillance counter-measures will be less than they would be if we were establishing a long-term system for you.
Security-Enhanced Phone Calls
With limitations on introductory free services while traveling, we provide for muti-layered, location-stripped, single-instance, salted encryption that would theoretically consume years of dedicated processing by the world's most powerful supercomputer to decode a single call, and then would need to be repeated with your next call.
Internet and E-mail
For security and reliability, we can coordinate with you for offshore-encrypted Internet access, disabled from being directly traced electronically, at no charge.
For sensitive communications, we prevent your location from being traced via the Internet or for your Internet usage to be intercepted. If you are unsure whether you have clean equipment, we have optionally available systems that surpass relevant MILSPEC technology at the TS//SCI level, lawfully beyond what is readily available commercially. That level of security surpasses what is readily available commercially, and is enabled via separate technologies including location-stripped, internationally parsed, multilayered VPNs with salted single-instance encryption for your Internet. Your E-mail is further protected by additional layers of internationally parsed, singe-instance, salted encryption.
Multiple unrelated layers of premium-grade closed systems are used, surpassing relevant MILSPEC TS//SCI requirements. Hardware firewalls with multiple layers of UN-contracted antimalware is included at no charge with packages of the Executive Collection, and with regularly priced weekly/monthly Signature hospitality.
These protections bypass exposures to to a wide variety of vulnerabilities, as would otherwise be present with, for example, direct TOR connections.
Security of Ethernet or Convenience of Wi-Fi
Enhanced-security Ethernet is recommended and free with advance request for most packages, particularly with weekly and monthly services.
We can help to enable powerful security for your data and Internet activity during your stay with us.
Most lower-security travelers prefer Wi-Fi, although any Wi-Fi system—no matter how modern or of relatively good quality—is inherently porous with a variety of uncertain vulnerabilities. Fortunately, regardless of the connection method, if an adversary does not know where you are, your connectivity is difficult to target--as long as you have not left breadcrumbs, provided information to soft targets, and have not otherwise been tracked (under our core business of countersurveillance via contracted legal services, we can provide professional assistance in these areas—please ask).
Most of our clients choose our services because we carefully maintain the confidentiality of their location, and, as such, targeted espionage by sophisticated adversaries is sufficiently suppressed to the point that the inconvenience:security ratio is not worthy of an Ethernet connection, in their minds. As professionals, we have never encountered a client who wants to use Wi-Fi who also had maintained sufficiently consistent protections to prevent tracking, and we advise all clients to opt for wired Ethernet, but we ultimately adhere to our clients' wishes.
Because the majority of business travelers prefer Wi-Fi, we provide Wi-Fi by default, but please let us know if you would prefer the greater security of a wired Ethernet connection. In general, with most rate plans for most package types at most locations, we can provide wired Ethernet with at least two weeks' advance notice, usually at no additional charge. Reimbursement of our actual costs applies with Rabbit Hole Refuge and specially discounted Signature.
Security-Oriented Data Storage
As much as possible, the concierge maintains your records remotely, under multiple layers of encryption for transmission and storage, parsed into packets on multiple servers in neutral offshore countries. Temporarily local working files are generally stored under multiple layers of encryption. After your stay with us, most of your data normally remains parsed among those servers under multiple layers of encryption and accessed under salted single-occurrence encryption.
An aspect of our motivation of providing hospitality services so that we can demonstrate our value to potential clients pertains to seriously powerful countersurveillance. For additional fees, we can provide you with an extraordinarily secure, full-featured computer system, which would also provide you with the productivity of being connected to two large monitors and a full printer. If you are willing to abide by the inconvenient protocols and incur the reasonably affordable costs, we can uphold a broad spectrum of sophistication that generally surpasses many TS//SCI intelligence specifications.