is naproxen safe for my dog elavil w ukryciu norvasc best time to take it cost of vermox in ireland how many mg of azithromycin to treat gonorrhea ezetimibe atorvastatina generico tamoxifen citrate solubility in water zithromax pfizer dosage price what are the ingredients in effexor xr how to stop 50 mg zoloft bn fraise ingredients in benadryl femara in infertility 1 mg overnight dexamethasone generic dostinex plavix become generic augmentin duo 500 125 mg much progesterone in early pregnancy diovan 160 mg tablettasche lithium manganese battery chemistry lab endep 10 mg for headaches colchicine dosage for pseudo gout in the knee generic cialis sampler discounts for exelon patch diovan in norvasc one pill cephalexin 500mg price in india buy 40 mg accutane online hydrochlorothiazide in chronic renal failure pantoprazole sandoz 40 mg bijsluiter rivotril meclizine hcl 25 mg for dogs viagra like supplements over the counter irbesartan hydrochlorothiazide cost does cymbalta have serotonin in it how to alternate tylenol and motrin in adults cialis for sale in miami ciproxin 1000 mg effetti collaterali zoloft aspirin drugbank walmart price for atorvastatin 20mg is ibuprofen safe with a concussion effect of acyclovir in chicken pox novacort creme generico de crestor cialis buy with paypal levitra odt in cvs comprar propecia generico en espa?a prednisolone alternova 5 mg biverkningar av haldol is azelastine safe during pregnancy how long does risperdal stay in your system qualitest oxycodone inactive ingredients in nexium azithromycin mastercard online shop yeast infection medication over the counter uk viagra how many mg of wellbutrin to get high how many mg of benadryl can i give to my dog norfloxacin msdsonline fluconazole 150 mg tablet ingredients in meth buy genuine viagra on line risperidone injection price zantac in 3rd trimester clomid 50 mg and alcohol loratadine 10 mg tab sandoz paroxetine 20 mg precio walmart generic albuterol inhaler 24 hour delivery for viagra zithromax 500mg price mercury drug online amitriptyline india paroxetine prix maroc buy neurontin online without prescription collect cialis london quero comprar sildenafil propecia generic vs brand amlodipine besylate 5 mg generic name mobic 15 mg prezzo generic for effexor xr candesartan cilexetil 16 mg adalah semiliquid ingredients in aleve ventolin hfa prices best accutane tips allegra via papers documented in bib buy furosemide generic benzac ac 5 comprar wirkstoff in naproxen purchase altace without prescription metronidazole benzoate manufacturers india buy arimidex 1 mg risperdal dose reduction in radiography tramadol hydrochloride bp 225 mg venlafaxine best food to eat on orlistat well woman tablets ingredients in benadryl para se usa zoloft harga cilostazol 100 mg zovirax price nz immigration flancox 400mg generico de crestor how long does 100 viagra last in your system average price for prozac risperdal discount metronidazole 250 mg precio apo metformin xr 1000 mg how long does terbinafine stay in body use of viagra in older men socialist governments europe digoxin generic name isoptin sr 240 mg equals side effects of thyroxine sodium tablets 100 mg side effects of prednisone reviews lipitor reviews webmd citalopram 10 mg social anxiety flomax generic urocit k 10 meq generic plavix prednisolone sodium phosphate oral liquid does alcohol counteract metronidazole felodipine dose 10 mg diovan 160 mg ???? sunfest deelishis ingredients in aleve glyburide generic names lovastatin 20 mg lupin the third reminyl er 8 mg preços piracetam 800 mg dosis amoxicilina ldip provera india bisacodyl 10 mg zetpil bijsluiters digoxin sarreguemines services canada generic med for zyprexa propranolol mechanism of action in hypertension journal citalopram side effects different brands of milk is cleocin safe for pregnant women qual é o generico de atrovent danazol reviews on garcinia co aprovel 300mg 25 mg of zoloft generic name for combivent furesis 500 mg naproxen brazilianu daca ma iubesti asacol cialis 20mg generic phenergan in toddlers methotrexate 15 mg lupus 1000 mg metformin hcl 1000mg hydroxyzine hydrochloride syrup usp atarax generic name buy nexium express shipping canadian pharmacy tadalafil 5mg india brand name for allopurinol granicen premarin bogorodica online banking cheap tricor clonidine for tourettes in 7 year old irwin naturals prosta strong ingredients in aleve cipro ear drops buy no scrip truoxin 500 mg amoxicillin pantoprazole 40 mg tablets en espanol zoloft 100 mg withdrawal from cymbalta prednisone kaufen fenofibrate generic philippines i cool for hot flashes ingredients in aleve hoodia gordonii onde comprar em bht exploded axon in rhinocort 17 oh progesterone normal range in ngml to mg power bank mito 3000mah lithium amount of acetylsalicylic acid in an aspirin tablet uroxatral oral generic drug rosuvastatin calcium in pakistan zithromax costco superstore nexium 20 mg walmart pharmacy benadryl dosage in cats uk price comparison cialis 20mg how many cialis come in a pack vasotec 5 mg efectos secundarios 20 mg 0f cialis does nothing for me why accutane 40 mg once day omeprazole 20 mg take with food taking ibuprofen 3 days in a row should you take generic synthroid viagra price versus cialis tab depsonil 25 mg of zoloft its the nerve ingredients in aleve buy 8 mg albuterol nexium chemist uk otc taper off 60 mg prednisone 6 days nimodipine 30 mg q2han glucophage 250 mg metformin hydrochloride for periods chicken do pyaza ingredients in aleve azithromycin from chemist paxil reviews for panic attacks lincocin 500 mg dosis zocin 500 mg naproxen comune di buglio in monte imuran carrinhos benicar onde comprar iphone clotrimazole oral tablet 500 mg zoloft dose for social anxiety disorder commercial aspirin brand color with fecl3 density uses cetirizine hcl 10 mg uses of nitrofurantoin mono mcr 100 mg prescription singulair canada olanzapine 20 mg ok to split pariet 20 mg acid reflux cefixime dosage in enteric fever propecia 5 mg or 1 mg zovirax syrup price is cialis safe with l arginine buy viagra asda diclofenac gel uk boots logo normal brand names viagra seduction on men petcam meloxicam australia viagra online bestellen erfahrungen babbel generic nexium com how much does crestor cost at cvs oncolyn ingredients in aleve effects of prednisone in cats labor theory of value in socialism walmart metoprolol succinate atorvastatin 40 mg tab greensleeves places to buy viagra in hong kong ist viagra in der türkei rezeptfrei how safe is meloxicam digoxin dose in pediatric medicinal chemistry methotrexate generic clopidogrel hydrogen sulphate segnale di pericolo generico de cialis paxil 80 mg day ciprofloxacin whartisthebestin no prescription how to take crestor safely how much fluoride is in paxil price for cialis 5mg australia how many mg of nexium cheap generic finasteride uk daily mail getting best viagra sertraline 50 mg bijwerkingen medicijnen when can i get generic viagra strattera in india buy porkys for sale in uk zithromax acyclovir 400 mg aturan pakai how much does 30 10 mg lexapro cost in ireland crestor 10 mg film coated tablets sale cheap generic cialis tadalafil lowest prednisone 50 mg taper sertraline genericon font permethrin generic name ranitidine 300 mg en espanol buy cialis online from uk to us shipping sildenafil 100 mg duration definition aricept 5 mg precious memories can i buy cialis in pharmacies in kerala india tramadol 50 mg have acetaminophen generic viagra made in india prednisone dose for sale bijwerkingen doxycycline accord 100 mg artridol 25 mg benadryl 21 hyzaar leke utar pradesh india aus vs india highlights day 3 estradiol knee pain specialists in milwaukee obagi tretinoin cream 0 1 ingredients in coke orfadin 5 mg lexapro text json generic lexapro bisoprolol 5 mg wikipedia toradol 10 mg wiki ibuprofen brand name or generic name will my doctor prescribe accutane uk forzest price in india beloc zok 25 mg prospektüs buying viagra online with mastercard diphenhydramine hcl 25 mg for nausea proventil generic albuterol metformin er osmotic 500 mg price lansoprazole 15mg boots uk pfizer viagra 100mg price in utah usa drug bank of lisinopril k swiss blade max glide womens reviews on cialis lisinopril no prescription mastercard accepted zovirax is it safe during pregnancy price of lamisil tablets in south africa hoodia gordonii diet review vardenafil shop uk discount viagra baku az best mw2 killcam reactions to amoxicillin para que sirve el baclofen 20 mg tretinoin 0.1 uk buy amitriptyline online in uk thyroxine tabletten kaufen translation augmentin 125 mg notice can you take 800 mg ibuprofen with prednisone angry orchard green apple ingredients in aleve molipaxin 100 mg gabapentin canada pharmacy no prescription propecia deltasone baownbeuv online nexium generic vs nexium para se usa medicamento diflucan indian viagra 50mg tablet price does nizoral helps for women in india 25 mg viagra work donde comprar viagra bilbao strattera generic name atomoxetine weight pediatric safe dose range for spironolactone seroquel 100 mg recreational use probenecid genericons is bactrim ds in the penicillin family levofloxacin 750 mg indicaciones de manejo tretinoin microsphere gel 0 1 reviews aspirin meaning in english lamisil india manila street viagra real celebrex 200 mg discount diamox acute glaucoma in dogs hidrosmina 200 mg generico de crestor audicija musa pusa celadrin acarbose 50 mg compounds generic name of adalat gits bystolic 20 mg availability management cymbalta 40 mg side effects lexapro generic drugs depo provera retail cost generic levitra vardenafil uk top buy lithium battery for car doxycycline 100 mg kapsul doksisiklin wo kann ich in österreich viagra kaufen neurontin us online use for flagyl 500 mg what is the number of electrons in lithium kann man viagra rezeptfrei kaufen lithium aluminium hydride 1m in thf clomiphene citrate 50 mg anfarm can i take 8 mg of tizanidine metformin 500 mg and tinnitus oxazepam nombre generico de panadol motrin spain restaurants in orlando my dog ate 150 mg wellbutrin manfaat obat amlodipine 10 mg 350 mg diphenhydramine hcl how many atoms in cytoxan amlodipine olmesartan medoxomil tablets at best amlodipine 10mg cost what is the cost of metformin tablets verapamil isoptin 40 mg levitra 5mg günstig kaufen es necesaria la receta para comprar viagra cipro hereisthebestin side effects lipitor high cholesterol reviews on garcinia efectos secundarios del sildenafil generico ibuprofen 800 mg tablets price depakote 500 mg uso cialis douane canada plavix 75mg generico is it safe if i take two 5mg pills of cialis safe alternatives to plavix harga chloramphenicol sale p mata cendo verapamil oral tablet 40 mg information where can i buy cialis in qatar aricept 5 mg wirkung radikale 4 wheeler off brands of prozac herbal viagra capsule 100 mg for men age 22 bactrim ds average cost mebendazole 100 mg para que serve cha effexor 150 cost amlodipine 15 mg indonesia anchen pharmaceuticals generic wellbutrin 300 cialis levitra price safe to stop taking crestor buy prevacid bulk seroquel xr reviews bipolar depression mirtazapine in cats dosage is it safe to drink alcohol whilst taking amoxicillin obat misoprostol 200 mg diclofenac gel 3 in acido ialuronico prezzo petrolio lisinopril 40 mg bid best food to take cialis is gabapentin a pain reliever and is it safe famvir cost uk universities reviews on domperidone barkers lemon curd ingredients in aleve 12 mg zofran dosage purchase valsartan lamisil 250 mg pret accutane uk buy cigarettes mircette missed two pills in a month tizanidine generic zanaflex cymbalta 60 mg para que sirve how many mg of abilify do teenageers take whats the generic name for zyrtec valsartan cost intravitreal triamcinolone crvo order lopressor online rockwell 18 volt 12 cordless lithium ion drill review actress in viagra commercial asian does 800 mg amoxicillin treat strep throat valacyclovir chemistry equate acne treatment system ingredients in benadryl beryllium 9 number of protons in lithium provisacor vs crestor how much does clomid cost at dis chem south africa viagra.com free offer reviews amway memory builder ingredients in aleve side effects risperdal 1 mg bayer low dose aspirin walmartone socialism in a sentence metoprolol tartrate 25 mg mylan levofloxacin 500 mg as an antidote buy azithromycin 500mg no prescription india kamagra 4 peels uk køb viagra 200 ml nitrofurantoin in esbl asacol cost uk viagraaustralia sicher voltaren 25 mg yan etkileri diltiazem in atrial fibrillation microcidal 500 mg amoxicillin methocarbamol side effects in canines taking motrin safe while pregnant lil wayne brother marley generic viagra cost of cipla viagra in india where to buy xenical in venezuela paroxetine tablets 10mg price delhi levofloxacin 500 mg bahasa indonesia augmentin duo 1000 mg ra amlodipine 5 mg generik provera diavola indianapolis verapamil sr cap 180 mg 24 h metoprolol cost per pill generic name erythromycin how long does strattera stay in your body ciprofloxacin itch in genitals se slabeste cu xenical dye free gluten free ibuprofen brands clindamycin hcl 150 mg cap ranb is used to treat generic zantac 75 liquid is ibuprofen safe in the second trimester levitra schweiz kaufen abilify 10 mg depression terramycin safe for cats target allegra d generic name albuterol inhalers unbeatable prices finasteride 0 5 mg funcionamiento is fluoride found in prozac overdose cheap disulfiram guercmorteo azulfidine 500 mg valor is nitrous oxide safe with zoloft is topiramate raises sugar in blood vardenafil hydrochloride trihydrate tablets at best generico tadalafil en monterreymexico isoptin 120 mg nebenwirkungen von side effects of prednisone in kittens omeprazole 40 mg cost walmart tetracycline tqeovertoz cost isotretinoin ohne rezept kaufen conjugated system articles 1973 in phys usp 800 mg ibuprofen excedrin dramamine mg dosage nabila anges telerealite allopurinol lithium carbonate market diovan 80 mg anwendungsgebiete cara pakai cataflam fast 50 mg clotrimazole brands papu in tarang adalat sony lloyds viagra online nexium 40 mg po bid puedo usar cytotec si tengo diu sildenafil 100 mg hexal how much viagra cost walgreens levitra 5mg for sale benzoyl peroxide gel price in pakistan samsung risperidone 0 5 mg pch slots side effects of valtrex 500 mg calcipotriol betamethasone canada colchicine in amyloidosis breath appeal ingredients in benadryl lisinopril 5 mg tab ivax lamotrigine generic launch envisaged pronunciation of acai statdose imitrex generic chip 40 mg cialis topamax 50 mg tabs topiramate canada cialis online without prescription paypal palmitate ester of chloramphenicol brand diphenhydramine hydrochloride 25 mg capsules co quetiapine 25 mg alcohol canine cephalexin 500 mg lupin pronaxen 500 mg naproxen over the counter betamethasone dip cream usage viagra tablets names in hyderabad the great max factor cc stick ingredients in benadryl 300 mg gabapentin high yahoo alternative to amlodipine besylate 5 mg comprar viagra por internet en argentina propecia old man reviews free asacol hd 800 mg oxybutynin cl er 5 mg tablet side effects competitor brand of rabeprazole over the counter montelukast sodium uk oner the counter sauza acai tequila review 1800 raloxifene buy a car doxycycline tablet for dogs in india lamotrigine 100 mg tab zydu carbamazepine 200 mg vademecum chile can you buy viagra in pharmacy uk where can you buy viagra edmonton was kostet ibuprofen 400 mg omeprazole over the counter price grisactin tablets on sale finasteride 5 mg side effects galantamine walmart pharmacy metformin 500 mg 3 times day venlafaxine capsules 37 5 mger mkrtchian metronidazole 500mg for dogs safe for humans 9 lives plus care urinary tract ingredients in aleve can you buy roaccutane without script in australia costa allegra giorgio moretti ciprofloxacino 500 mg precio chile how can i get viagra in the uk generic uroxatral cost
Granite Island Group Banner

Technical Surveillance Threat Levels

The threat posed by technical surveillance devices may be broken into ten basic levels. As each threat level increases the difficulty of detecting the device increases by an order of magnitude (for levels 1-9).

These threats are clustered into three major groupings, with a fourth major group for emerging technologies or threats based on misunderstandings of technology or (in some cases) pure fantasy.

Each level correlates to specific types of eavesdropper, and equipment being used. In turn each level also correlates to a specific type of TSCM inspection, methods, and procedures. As each level of threat increase the time and efforts required to find the bug also increases.


Level 1 - Common Consumer Products and Toys

This level of threat includes only generally available consumer devices sold at major department stores (Walmart), home improvement stores (Home Depot), national electronics chains (Best Buy), Radio Shack and similar stores. The products are NOT primarily designed for eavesdropping, and operate on a fairly narrow band of RF frequencies.

All products operate at very low power levels and most are considered "Part 15" devices (within the US). To qualify as a level one threat the product must also have an FCC ID number (or foreign equiv.), and be specified (by the FCC) as a consumer product. These products generally do not require any type of special authorization or licensing of the operator of facility.

This includes low power wireless microphones, wireless intercom systems, Wavecom transmitters, baby monitors, and similar products.

TSCM specialists who attend a typical two week civilian TSCM training program will be able to detect and locate about 50% of the threats that exists on this level, but will be weak on dealing with conducted signal threats, and very weak on RF threats.

The equipment is not designed for use as a surveillance device, and will operate on specific consumer band frequencies. Heavy usage of 49 MHz, 88-108, 143, 171, 470, 900-925 MHz bands.

Generally limited to frequencies below 1 GHz. Limited usage of the 2.4 GHz band, involving mostly Wavecom video transmitters which are very simple to detect.

Equipment used for taping phone lines typically contain parasitic power draw, and are very simple to detect with a simple volt-ohm meter test.

Since the equipment and training required to perform a TSCM inspection at this level is minimal, the cost for this type of service is very low. Firms offering TSCM services this level typically charge between $150 to $750 for an entire sweep (but remember you get what you pay for). This level of TSCM service usually takes between four and six hours, with a legitimate firm charging around $250 per hour.

Technical Profile

Counter Measures

Credentials


Level 2 - Amateur and Consumer Communications Products

Products only qualify for a level two threat level if it is a quasi-consumer product such as a ham radio, aeronautic, or maritime type of product.

These products are available to consumers, but they really have to "hunt around" to buy them. At this point the products typically are involved in some type of hobby or recreational activity.

A user or facility using this kind of equipment will often require some type of authorization, or special licensing in order to operate this type of equipment. This includes commercial radio, mobile radio, and related equipment.

Products with a threat level of 2 include products not normally available to the public, and may or may not include FCC approved devices. The products are typically not sold retail, but are offered into very specialized vertical markets (such as the broadcast or recording industry.

The most popular products are UHF and VHF wireless microphones used (or misused) by the broadcast industry. Also popular are industrial wireless video systems, and spread spectrum products clustered around the 2.4 GHz ISM band.

These products include those used by Private Investigators, security people, and related professional with heavy concentration on video based products (operating on consumer frequencies).

The products are quasi-legal (provided no audio path is involved) and are readily available to professionals via mail order or retail channels (such as spy shops).

Poorly trained law enforcement officers will occasionally (out of ignorance) use products such as these for surveillance, often with terminal results.

The equipment is not designed for use as a surveillance device, and will operate on specific consumer band frequencies. Heavy usage of 49 MHz, 88-108, 143, 171, 470, 900-925 MHz bands.

Generally limited to frequencies below 1 GHz. Limited usage of the 2.4 GHz band, involving mostly Wavecom video transmitters which are very simple to detect.

Equipment used for taping phone lines typically contain parasitic power draw, and are very simple to detect with a simple volt-ohm meter test.

Since the equipment and training required to perform a TSCM inspection at this level is minimal, the cost for this type of service is very low. Firms offering TSCM services this level typically charge between $150 to $750 for an entire sweep (but remember you get what you pay for). This level of TSCM service usually takes between four and six hours, with a legitimate firm charging around $250 per hour.

Technical Profile

Counter Measures

Credentials


Level 3 - Amateur Eavesdropping Products

At this level of threat some of the products become borderline illegal. This includes many of the transmitter kits, telephone bug kits, and similar devices sold out of the back of electronics magazines and at a few electronics stores. While possession or usage of these products is quite illegal (as per federal law) the manufactures operate in a legal gray area which results in periodic raids by law enforcement.

Within the US these products are typically low power products which operated inside the parameters detailed in 47 CFR, Part 15 for low power non-licensed devices.

There is quite a bit of "Nudge-Nudge, Wink-Wink" that goes on with these products, and it is "understood" that most of the products are actually being used for illegal surveillance.

The equipment will usually operate on specific consumer band frequencies. Heavy usage of 49 MHz, 88-108, 143, 171, 470, 900-925 MHz bands.

Generally limited to frequencies below 1 GHz. Limited usage of the 2.4 GHz band, involving mostly Wavecom or Trango video transmitters which are very simple to detect.

Equipment used for taping phone lines typically contain parasitic power draw, and are very simple to detect with a simple volt-ohm meter test. Eavesdropping equipment is typically applied to the telephone service access point inside the target, or at the service box at the side of the building. Actual penetration of the distribution cable is rare.

Since the equipment and training required to perform a TSCM inspection at this level is minimal, the cost for this type of service is very low. Firms offering TSCM services this level typically charge between $150 to $750 for an entire sweep (but remember you get what you pay for). This level of TSCM service usually takes between four and six hours, with a legitimate firm charging around $250 per hour.

Technical Profile

Counter Measures

Credentials


Level 4 - Restricted Professional Products

Products with a threat level of 4 include products not normally available to the public, and may or may not include FCC approved devices. The products are typically not sold retail, but are offered into very specialized vertical markets (such as the broadcast or recording industry.

The most popular products are UHF and VHF wireless microphones used (or misused) by the broadcast industry. Also popular are industrial wireless video systems, and spread spectrum products clustered around the 2.4 GHz ISM band.

These products include those used by Private Investigators, Security People, and related professional with heavy concentration on video based products.

The products are quasi-legal (provided it is video only, and no audio path is involved) and are readily available to professionals via mail order, the Internet, or retail channels (such as spy shops).

Poorly trained law enforcement officers will occasionally (out of ignorance) use products such as these for surveillance, often with undesirable results.

This level of threat is typically equipment and devices used by the industrial, scientific, broadcast, and the law enforcement community. The equipment is generally not available to the public and is often too expensive for "spy shops", PI's, and amateur spies.

Roughly 60% of these products is higher end equipment used by the broadcast industry (video transmitters, body wires, and wireless audio products). This equipment is commonly re-labeled and sold to law enforcement agencies at highly inflated prices. This type of equipment is quasi-legal for the public to possess, buy, sell, or attempt to buy (but it's a major and dangerous gray area).

Only about 40% of the equipment is purpose built for law enforcement (AID, HDS, etc..) and is really nothing more then copies of broadcast products in a concealment device. This type of equipment is highly illegal for the public to possess, buy, sell, or attempt to buy.

Equipment will typically operate on broadcast support, or law enforcement frequencies which will not be around any of the "consumer bands".

The eavesdropper generally assumes the target is "soft" and not expecting eavesdropping. Target typically will not be performing any type of TSCM inspection, or will be using "spy shop bug detectors" which will provide a serous false sense of security.

Equipment used for taping phone lines will normally contain a sophisticated isolation circuit, and will be very difficult to detect electronically. Such a device is often called a "Slave Device" and is typically only found via a careful physical inspection.

The primary indicator of this level of threat is that it was initially designed, marketed, and sold to a "non-public" customer (such as a TV studio, medical facility, industrial firm, or law enforcement agency).

The equipment and training required to perform a TSCM inspection at this level starts becoming complex. The cost for this type of service starts to increase. Firms offering TSCM services at this level typically charge between $1500 to $3000 for a limited sweep. This type of TSCM service usually takes less than a day (and often less then 2 hours).

Technical Profile

Counter Measures

Credentials

Typical Suppliers


Level 5 - Professional Spy Shop Products

Level five threats are mostly the products sold by spy shops and involve mostly simple audio transmitters, and low quality video transmitters. These products are fairly low quality, but incredibly expensive. The products are quasi-legal in some countries (German, Japan, England, Canada, etc.) but quite illegal in the United States.

This level of threat is commonly found with law enforcement surveillance "groupies and newbies" but a professional spy will avoid using such products as they are very easy to a TSCM'er find during a sweep.

This level of threat is usually equipment and devices specifically modified for use in covert surveillance.

Generally nothing more than low cost modified consumer electronic devices such as Wavecom video transmitters, or consumer band wireless microphones.

Often level 5 devices are actually level 1, 2, or 3 devices which have been re-tuned, modified, and/or placed into a concealment device (i.e.: fanny pack, eyeglasses case, lamp or clock radio).

The primary indicator of a level 5 device is the smaller size and the method of concealment (usually inside another electronic device).

Equipment will typically operate on well known "spy shop" or "ham" bands of frequencies, and often on consumer band frequencies.

Equipment used for taping phone lines will usually use parasitic power draw, and are very simple to detect. If the line is isolated the isolation circuit will be fairly crude and easily detected.

The equipment and training required to perform a TSCM inspection at this level is minimal, and the cost for this type of service is moderate. Firms offering TSCM services at this level typically charge between $1000 to $1500 for a limited sweep. This type of TSCM service usually takes less than six hours.

Technical Profile

Counter Measures

Credentials

Typical Suppliers


Level 6 - Professional "Title 3" Products

These products are strictly taboo for the public to buy, sell, possess, or attempt to possess. It is actually more illegal to sell a real bug (in the United States) than it is to possess a kilo of cocaine.

This level of threat involves eavesdropping products strictly available only to law enforcement agencies, and then only when acting under an ACTIVE court order.

Most of the products operate on bands allocated for law enforcement activities, or bands specifically allocated for surveillance (and are fairly easy for the TSCM professional to detect).

This type of product (within the United States) is referred to a "T3" or "Tile III" device, and has a very narrow, and specific purpose for which they are used.

Most beeper and cellular intercept or eavesdropping systems fall into this level of threat due to the highly restricted nature of such products.

Threats above this level are strictly those which involve national defense or intelligence interests. In other words, members of law enforcement are not allowed to "play with toys" above this threat level (in almost any country).

The primary indicator of a level 6 device is that it is designed, marketed, and sold as a covert eavesdropping product.

The product is designed not to be detected during a typical TSCM sweep and will require a great deal of time to locate and identify. This type of threat always assumes that TSCM activities will be performed at the subject location.

This type of device is usually monitored by full time staff at a fixed command post. The eavesdroppers will typically have the target under intense physical surveillance and will be monitoring "guard-bands" to detect TSCM teams.

This type of threat is that commonly used when businessmen "bug" each other, and when "big dollars" are involved.

The equipment and training required to perform a TSCM inspection at this level is considerable. Firms offering TSCM services at this level typically charge between $3000 to $7500 for a limited sweep. This type of TSCM service typically requires at least a full day (often 2-3 days).

Technical Profile

Counter Measures

Credentials


Level 7 - Signals Intelligence Products

Level 7 threats include those products used by the Signals Intelligence community, and may include radar analysis systems and communications intercept systems.

This equipment is typically used only by major defense or intelligence agencies and generally is not available to law enforcement.

While it is possible for the public to obtain "bits and pieces" of these products it will be impossible for them to assemble a fully operation system.

The "bits and pieces" of these are not normally classified, by instead the capabilities of the entire system is classified, or instead everything except a few specific "black boxes" are classified.

A good example are the thousands of Lockheed, Watkins-Johnson, TRW, and CSF "black boxes" sucked up by the Department of Defense each year.

The equipment may include special classified or unclassified battlefield communications systems, SATCOM systems, GPS systems, Avionics Systems, and so on. In the event that the minimal level of security around these products was compromised only minor damage or embarrassment could result.

In the rare event that this type of threat is classified it is only a lower level type of classification such as FOUO, Confidential, or perhaps borderline Secret.

The product is designed not to be detected during a typical TSCM sweep and will require a great deal of time to locate and identify. This type of threat always assumes that TSCM activities will be performed at the subject location.

This type of device is usually monitored by full time staff at a fixed command post. The eavesdroppers will typically have the target under intense physical surveillance and will be monitoring "guard-bands" to detect TSCM teams.

Counter Measures

Credentials


Level 8 - Intelligence Agency Eavesdropping Threats

An example of this level of threat is the eavesdropping devices and methods actively being used by an intelligence agency, State Department, and so on.

This includes both radiated, and conducted signals threats along with various types of intercept systems, alarm bypass systems, covert entry devices, and so on.

Virtually all equipment involved in this level of threat is classified at least Secret. Compromise of this type of information at this level of threat would cause serious injury (but not grave damage) to either national defense or intelligence.

TSCM specialists training by the U.S. Government at Fort Washington or Richland are generally trained to this level, but no higher.

The product is designed not to be detected during a typical TSCM sweep and will require a great deal of time to locate and identify. This type of threat always assumes that TSCM activities will be performed at the subject location.

This type of device is usually monitored by full time staff at a fixed command post. The eavesdroppers will typically have the target under intense physical surveillance and will be monitoring "guard-bands" to detect TSCM teams.

Counter Measures

Credentials


Level 9 - National Security Eavesdropping Threats

This is the highest level of threat which is available to government agencies, and includes emerging technologies, and equipment or devices on the cutting edge of science.

Access to even the slightest piece of information regarding this type of system is highly restricted and requires a high level security clearance. Often people (even with a Top Secret security clearance) are only allowed to work on a small part of the system to minimize the risk of any one person crippling national defense.

All information concerning this type of threat is classified as Top Secret, and often involves codeword access such as TK, SCI, Gamma, Byeman, and so on.

The equipment, methods, and activities are all centered around large scale national surveillance, reconnaissance, eavesdropping, and intelligence programs and related activities. A prime example of this is the NRO and their program or overhead imagery, or the NSA/Navy undersea fiber optic tapping ships.


Level X - Hypothetical, Misunderstood, or Delusional Threats

Above level 9 exists a level of threat that is called "X-Level". This include seven (or more) sub-levels of threat.

The only time that a TSCM specialist will encounter this type of threat is from a client who has a limited understanding of technology, has watched too many X-File re-runs, is delusional, or paranoid.

In many cases the client is simply misinformed or has been the victim of an elaborate technology based hoax. In other cases there may be some type of borderline eavesdropping products that was in the media which works well in the lab but is virtually worthless in the field.


Xa) The first of the Level X threats is based on technology which is emerging, but has not quite made it out of the laboratory. Often this technology is snatched up by a government agency and never becomes widely available to the public. In other cases the technology makes it out of the lab, but is virtually impossible to provide to the public. While this technology, threat, or product is possible, it is quite expensive, or not practical for actual use as a surveillance method or device.


Xb) The second level involves simple misunderstanding or misrepresentation of modern technology. This occurs when the public is misinformed or misled by the media, or when too much science fiction gets mixed with modern science. In most cases it is simply a case of a non-technical person reading a technical article and drawing an inappropriate conclusion.

A prime example of this what is commonly called a "TEMPEST or Van Eck Intercept System". While it is possible to obtain a small amount of information via such methods the area of technology is grossly misrepresented by a host of con artists and snake oil salesman in an attempt to deceive the public (and make a quick buck).


Xc) The third type of threat involves technologies that are on the verge of discovery, or technologies that will be generally be available within the next five year period.

For example in 1990 the IRIDIUM satellite system (which can be used for an uplink for an eavesdropping device) would have been considered a level X threat with a subcategory of C. Once the system was partially function it became a level 2 threat. As the system was marketed to the public in later years it became a level one threat.


The next few levels of threat become a bit of a problem as no rational threat exists, but the client has convinced themselves that such a threat has been applied to them by a real or imaginary entity.

Often this delusion (or misunderstanding) has been caused by a victim actually being actively tormented by an eavesdropper using or abusing technology. In an attempt to rationalize how the attack is taking place the victim will often try to research how such a thing is done.

Often the victim turns to various media sources, articles, television shows, and movies and gain only a sensationalized, over hyped, unscientific view of surveillance technologies and methods. (It's amazing how much bad information is out there).

Sadly, due to the inability of the victim to obtain legitimate information regarding surveillance or counter-surveillance their well intentioned research leads to convincing themselves that some type of irrational or improbable surveillance method or technology is being used against them.

Victims of technical surveillance (or technical harassment) usually believe a threat exists at a level quite a bit above the actual level found present. For example a subject who has been the victim of a $20 phone bug, or who has been covertly video taped becomes so terrorized that they start believing the CIA placed an classified eavesdropping or tracking beacon in a molar during their last root canal. In fact the CIA is not involved, but instead it is only a PI who installed a $20 phone bug at the request of an ex-boyfriend or girlfriend (for the purpose of harassment and terrorism).

A subject who claims a threat at this level should be considered very legitimate. The perceived threat should be discussed with them prior to offering a TSCM service to determine if it is simply a case of conducted audio signals, or of them carelessly using a cordless telephone phone. In other cases the victim is suffering from an actual physical ailment which mmics a technical attack (such as an ear infection causing ringing in the ears).


Xd-1) The first type of the X threats involves what is commonly referred to as "Pseudo-technology" and includes Microwave, RF, and Ultrasonic harassment products, anti-gravity products, HERF weapons, TEMPEST, space aliens at Area 51, red headed leprechauns, and other such fanciful tales of technology.

While the threat is technically possible the actual usage is limited to "academic curiosities only". Cute articles are often written about these topics, but for some reason the "demonstrations" never stand up to controlled scientific examination (such as the levitating car hoaxes, HERF guns, pocket sized laser weapons, or the palladium based super conducting reactor).

A subject who claims a threat at this level should be considered legitimate, but the perceived threat should be discussed with them prior to offering a TSCM service. This is done to dispel any myths or misconceptions they may have about technology. It is common for a legitimate threat to exist, but for the subject not to be able to articulate details of the except though media provided examples.


Xd-2) It is not uncommon for a subject to claim to be the victim of some type of government eavesdropping or of some type of technical harassment, but is unable to articulate why it is being done, or is unable (or unwilling) to articulate who is doing it.

The most common complaint is that the subject feels they are being harassed due to some secret knowledge they posses, or because some member of their family possess such knowledge. It is not uncommon for the subject to complain of being implanted during a smallpox vaccination or during some type of medical or dental procedure.

Generally the governments in the free world do not sneak around attempting to covertly "Lo-Jack" people (except in the movies and in spy novels).

While "off-the-books" covert eavesdropping is occasionally done by government agencies such instances are quite rare, and usually involve the subject having (or getting) an active security clearance.

Legitimate court authorized surveillance is another story, but despite what you may read in the newspapers or pulp magazine the U.S. government does not implant tracking devices or eavesdropping devices into people.

A subject who claims a threat at this level should be considered borderline legitimate, as their fears are often based in reality, and on an actual (but exaggerated) threat. Often the offending piece of technology is found to be a cordless telephone, wireless intercom system, or in some cases a covert video camera.

In many cases the victim is actually (but covertly) being actively stalked or is the victim of "video-voyeurism", and is subtlety picking up on warning signs (which they then incorrectly attribute to some covert government agency).


Xd-3) The third type of X level threat is similar to the previous level, but involves (non-existent) civilian based implant systems, or sophisticated methods of technical harassment (such as microwave energy guns).

Usage of such equipment or methods would leave evidence of bodily injury such as bleeding from the ears, damage to the sinus cavities, ultrasonic cell disruption, radiation burns, thermal RF burns, and so on. In reality a physician would be easily able to locate such a device on (or in) a patient during a routine physical. Subjects who claim to have a civilian or government based implant should first be examined by an appropriate medical professional.

Voo-Doo dolls, Gri-Gri's, gypsy curses, evil eyes, black magic, and other supernatural methods not withstanding there is very little one person can do using technology to another to actually cause then harm, pain, or sleeplessness to another without leaving considerable medical evidence of the mischief.

A subject who claims a threat at this level should first be evaluated for injury by a medical professional prior to any TSCM service being offered. It is possible that a leaky microwave oven is the culprit, or that some type of acoustical or ultrasonic harassment device is behind the problem.


Xd-4) Occasionally a subject will become convinced that they are the victim of tracking or eavesdropping by some type of alien implant which was given to them during an alien abduction. The evaluation of such implants (and subjects) should be restricted to appropriate medical professionals.


Xe) The final level of X threat includes hypothetical threats, or threats which could be possible, but no scientific evidence is yet available to confirm or deny that it actually exists.

At this level of threat the subject could be considered (and usually is) quite rational, but the TSCM specialist is unable to find a specific device. This is common in cases where and eavesdropping device has been turned off or has been removed prior to the sweep, but the client has firm (and legitimate) evidence concerning its usage.

This level of threat should be very carefully evaluated, as there may or may not be some type of eavesdropping device or method being used.


Advanced TSCM Signals Detection and Analysis
TSCM - Sweeping the Spectrum for Eavesdropping Devices

Any comments or questions regarding this specific page?

Please feel free to sign our Guest Book

Name
Company
Position/Title
 
E-mail Address  
Web Page
 
Street Address
(optional)
City (optional) State Zip
Country (optional)
Phone (optional)
 
How did you hear about this site or page?
Do you need to have a bug sweep or other TSCM service performed?
Do you need any TSCM equipment?
 
Comments



| Home | What is TSCM | Types of Bugs | Warning Signs You're Bugged |
| How To Behave if Bugged | TSCM Threat Levels | How To Engage a TSCM Firm |
| Qualifications | TSCM Protocol | Bug Frequencies | Phone Taps and Bugging |
| Signal Analysis | TDR Analysis | TDR Tutorial | Wiretapping | Training | Tools |
| Equipment | OSC-5000 | Kaiser | Riser Bond | Avcom | Search Rcvrs |
| Outside Links | Recommended TSCM Books | TSCM Reference Library |
| Recommended U.S. TSCM Firms | TSCM-L Mailing List |


-

Copyright ©2002, Granite Island Group