Granite Island Group Banner

Technical Surveillance Threat Levels

Level 3 - Amateur Eavesdropping Products

At this level of threat some of the products become borderline illegal. This includes many of the transmitter kits, telephone bug kits, and similar devices sold out of the back of electronics magazines and at a few electronics stores. While possession or usage of these products is quite illegal (as per federal law) the manufactures operate in a legal gray area which results in periodic raids by law enforcement.

Within the US these products are typically low power products which operated inside the parameters detailed in 47 CFR, Part 15 for low power non-licensed devices.

There is quite a bit of "Nudge-Nudge, Wink-Wink" that goes on with these products, and it is "understood" that most of the products are actually being used for illegal surveillance.

The equipment will usually operate on specific consumer band frequencies. Heavy usage of 49 Mhz, 88-108, 143, 171, 470, 900-925 MHz bands.

Generally limited to frequencies below 1 GHz. Limited usage of the 2.4 GHz band, involving mostly Wavecom or Trango video transmitters which are very simple to detect.

Equipment used for taping phone lines typically contain parasitic power draw, and are very simple to detect with a simple volt-ohm meter test. Eavesdropping equipment is typically applied to the telephone service access point inside the target, or at the service box at the side of the building. Actual penetration of the distribution cable is rare.

Since the equipment and training required to perform a TSCM inspection at this level is minimal, the cost for this type of service is very low. Firms offering TSCM services this level typically charge between $150 to $750 for an entire sweep (but remember you get what you pay for). This level of TSCM service usually takes between four and six hours, with a legitimate firm charging around $250 per hour.

Technical Profile

Counter Measures

Credentials


Other Eavesdropping Threat Levels


-

Any comments or questions regarding this specific page?

Please feel free to sign our Guest Book

Name
Company
Title
E-mail
Address
Web Page
URL
How did you hear about this page
Comments



| Home | What is TSCM | Types of Bugs | Warning Signs You're Bugged |
| How To Behave if Bugged | TSCM Threat Levels | How To Engage a TSCM Firm |
| Qualifications | TSCM Protocol | Bug Frequencies | Phone Taps and Bugging |
| Signal Analysis | TDR Analysis | TDR Tutorial | Wiretapping | Training | Tools |
| Equipment | OSC-5000 | Kaiser | Riser Bond | Avcom | Search Rcvrs |
| Outside Links | Recommended TSCM Books | TSCM Reference Library |
| Recommended U.S. TSCM Firms | TSCM-L Mailing List |


-----------

Copyright ©1993, 1994, 1995, 1996, 1997 James M. Atkinson