- Acoustic/Audible Pressure Waves
- Acoustic/Ultrasonic Pressure Waves
- Optical/Invisible Light (UV, etc...)
- Optical/Visible Light
- Optical/Invisible Light (Infrared, etc...)
- RF Transmission (VLF) 3 kHz - 3 MHz
- RF Transmission (HF) 100 kHz - 70 MHz
- RF Transmission (VHF) 30 MHz - 300 MHz
- RF Transmission (UHF) 300 MHz - 1 GHz
- RF Transmission (Microwave Low) 900 MHz - 3 GHz
- RF Transmission (Microwave Mid) 3 GHz - 12.5 GHz
- RF Transmission (Microwave High) 12.5 GHz - 26.5/33/40 GHz
- RF Transmission (Microwave mm) 26.5/33/40 GHz - 325 GHz
- RF Transmission (Microwave mm2) 325 GHz - 1.5 THz
- Free Space - Magnetic
- Audible (Voice Frequency)
- Current Carrier up to 700 kHz (AC Mains, Phone, CATV, etc)
- Radio Frequency (AC/Mains Devices, waveguide, etc)
- Fiber Optic
- Counter-Counter Intelligence (Counter-TSCM)
- Counter Intelligence (TSCM)
- Active (Classic Spying, Heavy Bugging, & Black Bag Jobs)
- Passive (Primarily Listen, Minor Bugging)
- High Level Intelligence (Domestic - DEA, FBI, USSS, FISA, etc...)
- Low Level Intelligence (Domestic Law Enforcement)
- Investigation of Major Crimes (Murder, Arson, etc)
- Active (Wiretaps, Body wires, etc)
- Passive (Cellular Phone/Beeper Monitoring)
- Tactical (SWAT Teams, Throw-Phones, etc)
- Management (Video in Police Cars, wireless microphones)
- Outlaw (Illegal Surveillance Activities)
- Intelligence - Active (Black Bag Jobs)
- Intelligence - Passive (Cell Phone/Beeper Monitoring)
- Surveillance - Active (Black Bag Jobs)
- Surveillance - Passive (Cell Phone/Beeper Monitoring)
- Intelligence - Active
- Intelligence - Passive
- Surveillance - Active
- Surveillance - Passive
Types of Wiretaps, Bugs and MethodsIf you are concerned about covert eavesdropping then it may be wise to contact Granite Island Group, or another TSCM firm and immediately schedule a "Bug Sweep" or TSCM inspection. However, do not call from a suspect telephone, and understand that it is critical that you get some out to your location as quietly, and as quickly as possible.
Bugging (Everybody's Favorite Subject)
A "Bug" is a device that is placed in an area, which then intercepts communications and transmits or conducts them out of that area to a listening post. The eavesdropper can be just a few feet away from the victim, hundreds of feet, or even miles away depending on the kind of bug used.
There are five primary categories of "Bugs": (Acoustic, Ultrasonic, RF, Optical, and Hybrid).
An Acoustic Bug is the placing of a water glass, stethoscope, or rubber tube into an area and directly intercepting the communication with the naked ear (without the use of electronics). This also applies to sections of an area where sound is leaking though soft spots around windows, structural defects, ventilation structures, poorly installed power outlets, and so on.
An Ultrasonic or VLF Bug is a technique use to convert the sound into an audio signal above the range of human hearing; the ultrasonic signal is then intercepted nearby and converted back to audio. In this case audio pressure waves are used instead of creating a radio signal.
An RF (or Radio Frequency) Bug is the most well known type of bugging device. A radio transmitter is placed in an area or in a device. This is your classic martini olive bug and "spy shop" store device. These are extremely easy to detect, cheap, disposable, but difficult to trace back to the person who actually planted it. A properly equipped TSCM specialist can actually detect this kind of device at a significant distance, but it does require some time to properly accomplish this task. Keep in mind that any legitimate bug sweep takes hours, or even days, but not minutes).
An Optical Bug is a bugging device that converts sound (or data) into an optical pulse or beam of light. It is rarely used, expensive, but easy to detect. A good example of this would be active or passive laser listening device.
Any of the above techniques and devices can be combined to make a Hybrid eavesdropping device.
And clowns that caper in sawdust rings,
And common people like you and me
Are builders for eternity?
Each is given a bag of tools,
A shapeless mass, a book of rules;
And each must make.. ere life is flown
A stumbling block, or a stepping stone.
-- R. L. Sharpe, "A Bag of Tools"
Wiretapping is the preferred method of obtaining intelligence (for quality reasons), it involves tying into a wire or other conductor that is used for communications. This wire can be a telephone line, a PBX cable, a local area network, a CCTV video system, an alarm system, or any other communications medium. The goal in a wiretapping is to secure high quality information, and to minimize the possibility of the eavesdropping being detected (remember radiated signals are easy to detect). Look inside of your "electrical or phone closet" at your office to see how easy it would be to plant a bug!
Wiretaps are broken into four primary categories (Hardwired, Soft, Record, and Transmit).
A Hardwired Wiretap, is when physical access is gained to a section of wire that the signal (i.e.: telephone line) travels on. A second set of wires is attached (normally through the use of an isolation or slave device), the signal is then bridged back to a secure location. This type of wiretap when discovered is fairly easy to trace back to the listening post. This type of wiretap is very popular with the police, but is usually outside the scope of most eavesdroppers. If the eavesdropper is using a "slave" or similar isolation device on a telephone the tap will be virtually impossible for anybody except a highly trained or properly equipped "bug sweep" professional to find (and there only around a dozen of these in the US).
A Soft Wiretap, is a modification to the software used to run the phone system. This can be done at the telephone company, or in the case of a business, the PBX. A soft wiretap is a preferred method to tap a phone, easy to catch on a PBX, but tougher to find in the phone company's system. It is sometimes called a REMOBS (REMote OBServation), DATU, ESS, or translation tap. This type of tap is very popular with large law enforcement agencies, intelligence agencies, larger corporations, and with hackers who find it quite simple to gain access via maintenance software. This type of tap is actually very simple to find, but does require completely un-restricted access to the inner workings on the phone company's computers (which is very tough to obtain).
A Recording Wiretap, is nothing more than a tape recorder wired into the phone line, very easy to find on a TSCM inspection. Similar to a hardwired wiretap, but the tapes must be changed on a regular basis. This is very, very popular with amateur spies, and private investigators, but they are very dangerous to use, and many eavesdroppers have been caught red-handed when they showed up to service their illicit recorder. Digital recorders are replacing tapes, but as with the tape recorder, someone has to retrieve the data.
A Transmit Wiretap, is an RF transmitter (or "Bug") connected to a wire (often containing a microphone itself). This type of tap is very popular, however; the RF energy it produces radically increases the chance that it will be detected by a competent "Bug Sweeping" specialist (known in the business as a "TSCM Specialist" or Practitioner).
Wiretaps are extremely difficult to detect (if properly installed), require a very high level of technical expertise, and a great deal of equipment to locate. It is virtually impossible to detect most wiretaps with any spy shop toy, bug detectors, and other such gizmo's. Instead the TSCM specialist has to use hundreds, and often thousands of pounds of highly sophisticated laboratory grade instruments, and perform hundreds of highly sensitive measurements.
Families of Bugs
Free Space Emission:
Types of Covert Eavesdropping Activities
For a confidential consultation please E-mail: firstname.lastname@example.org
Granite Island Group
127 Eastern Avenue #291
Gloucester, MA 01930
Telephone: (978) 546-3803 / Fax: (978) 546-9467
International Callers: 001-978-546-3803 / Fax: 001-978-546-9467