Granite Island Group Banner

Technical Surveillance Threat Levels

Level 7 - Signals Intelligence Products

Level 7 threats include those products used by the Signals Intelligence community, and may include radar analysis systems and communications intercept systems.

This equipment is typically used only by major defense or intelligence agencies and generally is not available to law enforcement.

While it is possible for the public to obtain "bits and pieces" of these products it will be impossible for them to assemble a fully operation system.

The "bits and pieces" of these are not normally classified, by instead the capabilities of the entire system is classified, or instead everything except a few specific "black boxes" are classified.

A good example are the thousands of Lockheed, Watkins-Johnson, TRW, and CSF "black boxes" sucked up by the Department of Defense each year.

The equipment may include special classified or unclassified battlefield communications systems, SATCOM systems, GPS systems, Avionics Systems, and so on. In the event that the minimal level of security around these products was compromised only minor damage or embarassment could result.

In the rare event that this type of threat is classified it is only a lower level type of classification such as FOUO, Confidential, or perhaps borderline Secret.

The product is designed not to be detected during a typical TSCM sweep and will require a great deal of time to locate and identify. This type of threat always assumes that TSCM activities will be performed at the subject location.

This type of device is usually monitored by full time staff at a fixed command post. The eavesdroppers will typically have the target under intense physical surveillance and will be monitoring "guard-bands" to detect TSCM teams.

Counter Measures

Credentials


Other Eavesdropping Threat Levels


-

Any comments or questions regarding this specific page?

Please feel free to sign our Guest Book

Name
Company
Title
E-mail
Address
Web Page
URL
How did you hear about this page
Comments



| Home | What is TSCM | Types of Bugs | Warning Signs You're Bugged |
| How To Behave if Bugged | TSCM Threat Levels | How To Engage a TSCM Firm |
| Qualifications | TSCM Protocol | Bug Frequencies | Phone Taps and Bugging |
| Signal Analysis | TDR Analysis | TDR Tutorial | Wiretapping | Training | Tools |
| Equipment | OSC-5000 | Kaiser | Riser Bond | Avcom | Search Rcvrs |
| Outside Links | Recommended TSCM Books | TSCM Reference Library |
| Recommended U.S. TSCM Firms | TSCM-L Mailing List |


-----------

Copyright ©1993, 1994, 1995, 1996, 1997 James M. Atkinson