| Travel Day |
Day 1 |
Day 2 | Day 3 |
Day 2 | Wednesday, April 29, 2026 | ||
|---|---|---|
| Date & Time | Event Description | Location |
| Wednesday 08:00 | Participant | Exhibitor | Presenter RegistrationThe CTSC 2026 Registration Booth and Exhibit Area will open to conference participants beginning at 08:00 hours. | KC 303 |
| Session 7AWednesday 08:30 | Introduction to Advanced AI - Beyond the Chat BotsThe Technical Surveillance Counter-Measures (TSCM) field is entering a new era where Artificial Intelligence is no longer theoretical. In this live and unscripted session, Dale Jackaman, Licensed Security Consultant / Private Investigator (Canada) and Senior AI Developer, joins his cognitive AI research partner Katie Inskai to demonstrate how advanced AI now operates as a true investigative partner.
Presented by: | KC 303 |
| Session 7BWednesday 08:30 | CTSC 2026 "Bug-Off"The “Bug Off” will run parallel to the morning sessions on Day-2 of CTSC 2026 with plenty of time for the exercise as well as providing opportunities to take in some simultaneous conference presentations. Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants. It is designed to challenge experienced and give less experienced participants an opportunity to see what TSCM is all about. Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunities and gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 21-years in the running. Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”. The Office of Evil Intent, aka Andrzej Wolczanski, TSS, and Paul D Turner, TSS TSI, have spent the previous year, plotting and planning challenging methods and real-world compromises for this year’s event. Presented by:Sponsored by:![]() Professional Development TSCM Group Inc. | KC 306 |
| Wednesday 10:00 | Morning BreakTake a short refreshment break and chat with other participants before the next speaker session. Sponsored by:Price Langevin Technical Security | KC 303 |
| Session 8AWednesday 10:15 | Technical Security (TSCM) for the Executive Protection TeamThis presentation provides an overview of Technical Surveillance Counter-Measures (TSCM) and their critical role within executive protection operations. In today’s environment of increasing cyber-physical threats, TSCM ensures that executives and their communications remain secure from technical interception, eavesdropping, and information compromise. The session will introduce the fundamental principles of TSCM, including threat identification, vulnerability assessments, and the detection of covert surveillance devices. It will highlight how technical security integrates with physical protection to create a holistic defense strategy. Participants will gain insight into common surveillance risks—such as hidden transmitters, wireless data leaks, and compromised digital devices—and the tools and techniques used to detect and mitigate them. Implementation strategies will focus on establishing proactive protection protocols, including regular technical sweeps of offices, vehicles, and meeting areas; secure communication practices; and coordination with cybersecurity teams. Emphasis will be placed on developing standard operating procedures (SOPs) for information security and maintaining chain-of-custody documentation strategies for all TSCM activities. By the conclusion of this presentation, executive protection personnel will understand how to incorporate TSCM into their broader security posture, enhance situational awareness, and protect sensitive information against both physical and electronic threats. The goal is to strengthen the team’s ability to prevent, detect, and respond effectively to technical surveillance risks, ensuring the highest level of privacy and safety for the principal. Presented by: | KC 303 |
| Wednesday 11:30 | LunchJoin us for a working lunch in the Vistas Dining Room, the conference and next speaker resume at 1230 sharp. Sponsored by:![]() Professional Development TSCM Group Inc. ![]() Vilution Limited (UK) | Vistas Dining Room |
| Session 9AWednesday 12:30 | The Art and Science of TSCM Tradecraft - Participant InteractiveTSCM and CYBER security are complex problems that require experience, and critical-thinking that is decidedly outside of the box to anticipate, detect, identify, and mitigate technical vulnerabilities, compromises, and succeed within a counter-espionage role. Join us for the first ever, participant interactive, “The Art and Science of TSCM Tradecraft” exhibition during this year’s conference event. See how operators combine theory, application, methodology, strategy, tactics and equipment resources; and gain a better understanding of espionage and intelligence-gathering from the threat actor’s and technical operator’s perspective. Gain valuable hands-on working insight into the world of the Technical Security Specialist (TSS); by understanding the capability and limitations of various equipment, tactics, and techniques. Demonstration, balanced with participant interactive exercises, and a measure of historical reality! | KC 303 |
| Session 10AWednesday 14:00 | The Art and Science of TSCM Tradecraft - Participant InteractiveTSCM and CYBER security are complex problems that require experience, and critical-thinking that is decidedly outside of the box to anticipate, detect, identify, and mitigate technical vulnerabilities, compromises, and succeed within a counter-espionage role. Join us for the first ever, participant interactive, “The Art and Science of TSCM Tradecraft” exhibition during this year’s conference event. See how operators combine theory, application, methodology, strategy, tactics and equipment resources; and gain a better understanding of espionage and intelligence-gathering from the threat actor’s and technical operator’s perspective. Gain valuable hands-on working insight into the world of the Technical Security Specialist (TSS); by understanding the capability and limitations of various equipment, tactics, and techniques. Demonstration, balanced with participant interactive exercises, and a measure of historical reality! | KC 303 |
| Wednesday 15:00 | Afternoon BreakTake a short refreshment break and a chat with other participants before the next speaker session. Sponsored by:![]() Comsec Global Counterespionage Specialists | KC 303 |
| Session 11AWednesday 15:15 | Staying Safe in Travel, Domestic and InternationalThis session delivers a practical, highly focused introduction to personal security for personnel working or traveling domestically and abroad. Participants learn how global dynamics, local threat environments, and everyday criminal risks shape their safety profile, and they gain the tools to recognize, assess, and mitigate those risks in real time. The program emphasizes situational awareness, effective decision-making under stress, and proactive behaviours that reduce vulnerability in unfamiliar spaces. Each section translates essential security concepts into clear, actionable practices that apply directly to travel, hotels, and in-situ operations. Beyond core awareness skills, the session examines and recommends comportment in civil disturbances, carjacking, and hostage or kidnapping incidents. Attendees are aided in building a practical mindset for prevention, avoidance, and appropriate response. The goal is a confident, security-aware professional who understands how to keep themselves and their colleagues safer while operating in the field. Presented by: | KC 303 |
| Session 12AWednesday 16:15 | "What do needles look like? - Spectrum characterization tooling that matters."In the midst of a complex spectrum environment, the ability to determine what belongs, what does not and the source is the key TSCM goal. In this presentation, Dr. Don Goodeve, Lead Developer on Kestrel discusses the technical challenge. This talk surveys the existing tools in Kestrel and introduces new digital and analog signal characterization features that are proving effective during both collection-time and post-collection analysis. Presented by: | KC 303 |
| Wednesday 17:30 | Q & A Opportunity | Daily Reminders and AnnouncementsEnd of Day-2 reminders and announcements. Presented by: | KC 303 |
| Wednesday 17:45 | CTSC 2026 | Casual Dinner & Awards NightJoin us for a casual, relaxing, and always entertaining Dinner and Awards Night event. The evening rounds out with our Keynote speaker and a networking opportunity with like-minded industry leaders in TSCM and Cyber-Security disciplines. A causal sit-down dinner will be served promptly at 18:00 hours in KC 301. Sponsored by:![]() Professional Development TSCM Group Inc. ![]() Vilution Limited (UK) | KC 301 |
| Session 13AWednesday 19:00 | Keynote SpeakerTBA Presented by:Sponsored by:![]() Professional Development TSCM Group Inc. ![]() Vilution Limited (UK) | KC 301 |
| Wednesday 20:00 | Industry Awards | Bug-Off Awards | Antenna Design Awards | Door PrizesSponsored by:![]() Professional Development TSCM Group Inc. ![]() Vilution Limited (UK) | KC 301 |


