Granite Island Group Banner

TEMPEST in a TEAPOT Power Levels Modulation
Frequency
International Leader in TSCM
Call Us When You're Serious About Bug Sweeps


The First, The Largest, The Most Popular, and The Most Complete TSCM,
Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet.


Founded in 1987 and located near Boston Massachusetts, Granite Island Group, is an internationally recognized leader in the field of Technical Surveillance Counter Measures (TSCM), Bug Sweeps, Wiretap Detection, Signals Intelligence (SIGINT), Electronic Surveillance Technology, Telecommunications, Communications Security (COMSEC), Counter-Intelligence, Training, and Technical Security Consulting.

Granite Island Group also provides expert technical, analytical and research capability for the detection, nullification, and isolation of eavesdropping devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses.


This ten dollar bug could devastate your business
Even in friendly territory a fortified camp should be set up;
a general should never have to say 'I did not expect it.'

-- The Emperor Maurice,
The Strategikon, c. 600ad
This nasty little ten dollar bug could totally devastate your business
and your life. Are you prepared to find such things?
[We Are!!!]


Everything You Ever Wanted To Know About TSCM and Bug Detection

 * What Is TSCM, Bug Sweeps, and Bug Detection All About (FAQ)?

 * Technical Surveillance Threat Levels

 * Various Types of Technical Surveillance Bugs and Wiretapping Activities

 * Technical Surveillance Warning Signs: Have You Been Bugged

 * What To Do If You Think You Have Been Bugged

 * How To Commission Someone To Check For Bugs

 * What Does TSCM Involve - Sequence of Events for a Typical TSCM Inspection

 * Recommended U.S. TSCM Firms

 * TSCM, Technical Security, and Related Mailing Lists


Background on Granite Island Group
Who We Are, What We do, and What Does it Cost...

* Granite Island Group Background and Mission Statement

* Background and Qualifications of James M. Atkinson

 * What Does a Bug Sweep Cost? - Terms and Conditions


TSCM 101 - The Technical "Meat and Potatoes"
The following are a series of brief entry level tutorials regarding
specific areas and topics relative to TSCM and methods used to find
bugs and other eavesdropping devices.

 * Noise and Sensitivity

 * Modeling Eavesdropping Devices

 * TSCM Antenna Methods and Protocols

 * Wireless Microphones Revisited

 * The Wavecom Eavesdropping Threat

 * Video Signal Eavesdropping Threat

 * Detection, Isolation, and Evaluation of Spread Spectrum Signals

 * Frequency Allocation Basics

 * TEMPEST Basics

 * Basic Bug Frequencies

 * DTV Signals Analysis

 * Tutorial on Basic Sweep Gear


No enterprise is more likely to succeed than one concealed
from the enemy until it is ripe for execution.

-- Niccolo Machiavelli, The Prince, 1521


Techniques Used To Find Bugs and Other Technical Security Threats

 * Spectral Analysis of Various RF Bugging Devices

 * Popular RF Bugging Frequencies

 * Wiretapping 101 ("Outside Plant" Devices)

 * Phone Set Bugging and Modification Techniques

 * Time Domain Reflectometry Analysis (Wiretap Locating)

 * Time Domain Reflectometry Tutorial


We are apt to shut our eyes against a painful truth...
For my part, I am willing to know the whole truth; to know the worst;
and to provide for it.
-- Patrick Henry


U.S. Laws Regarding Electronic Surveillance

 * Executive Order 12333 - United States Intelligence Activities

 * Title 50, Chapter 36 - Foreign Intelligence Surveillance

 * Title 18, Chapter 119 - Oral, Wire, and Electronic Communications Interception

 * Title 18, Chapter 121 - Stored Wire and Electronic Communications Records Access

 * Title 18, Chapter 205 - Searches and Seizures

 * Title 18, Chapter 90 - Economic Espionage Act of 1996


TSCM and Bug Detection Equipment Reviews

* Spectrum Analyzers

* Antennas and Signal Acquisition

* Vector Signal Analysers

* Demodulation and RF Intercept Equipment

* Time Domain Reflectometers

* Oscilloscopes

* Multimeters

* Craft Instruments

* TSCM Specific Instrumentation

* Non Linear Junction Detectors

* Acoustic TSCM Equipment

* Physical Search Equipment

* Photographic and Imaging Instruments

* Auxillary Instrumentation

* Ancillary Instrumentation

* Video Instrumentation

* Special Purpose Vehicle Consideration (SPV)


TSCM Product Catalog "Bug and Wiretap Detectors"

 * Tutorial on Basic Sweep Gear

Briefcase Bug Detection Systems

 * CPM-700 Counter Surveillance Probe and Monitor [CPM-700 Brochure]

 * OSC-5000 Omni-Spectral Correlator (OSCOR) [OSC-5000 Brochure] [OPC Software Brochure]

 * ORION "The Hunter" Non-Linear Junction Detector (NLJD) [ORION Brochure]



Signal Analysis and RF Instruments

 * Avcom TSCM Equipment


Time Domain Reflectometers and Network Analyzers

 * Riser Bond Time Domain Reflectometers (Wet TDR)

 * Fluke LANMeter (Dry TDR)


Technical Security and TSCM Countermeasures Kits

 * 1040a - Entry Level Countermeasures Kit

 * 1040b - Intermediate Countermeasures Kit


Audio Countermeasures

 * 1059 - Audio Preamplifier

 * 1019 - Preamplifier/Amplifier

 * 1079 - Power Amplifier

 * [ANG-2000 Acoustic Jammer Brochure]

 * [PNG-200 Acoustic Jammer Brochure]


Telephone Countermeasures "Wiretap Detectors"

 * 1080D - Telephone Analyzer (MKII)

 * 1080H - Telephone Analyzer

 * 1080CT - Component Test Unit

 * 1080E - Electronic And Modular Telephone Accessory

 * 1080TDR - Time Domain Reflectometer (TDR) Pulser

 * [TSU-3000 Scrambler Brochure]


Radio Frequency Countermeasures "Bug Detectors"

 * 2044 - Ambient RF Strength Indicator

 * 2050CA - RF Locator

 * 2057A - RF Locator

 * 2055HA - Near Field RF Detector/Differential RF Probe (MK IV)

 * 2045B - RF Feedback Detector

 * 2065 - RF Detector (Under Desk Mounted)

 * 2040B - Test Oscillator


ELF Countermeasures "Tape Recorder Detectors"

 * 2059H - Tape Recorder Detector (Hand Held)

 * 2059HV - Tape Recorder Detector (Hand Held)

 * [TRD-800 Brochure]


Wearable Countermeasures "RF/Tape Recorder Detectors"

 * 2060LT - RF Detector (Wearable, Light and Tone)

 * 2060LV - RF Detector (Wearable, Light and Vibrator)

 * 2062 - RF and Tape Recorder Detector (Wearable)


Carrier Current/Sub Carrier Countermeasures

 * 2030 - Carrier Current Detector/Probe

 * SCD5 - Carrier-Current/Sub Carrier Detector

 * 1059VLF - Direct Conversion Receiver


Stethoscopes and Audio Probes

 * 2010/2010A - Doppler Stethoscope

 * 2046I - Inductive Stethoscope

 * 2047U/C - Ultrasonic/Contact Stethoscope

 * 2049M - Electronic Stethoscope

 * 4020 - Mini Stethoscope

 * 8010C - Metal/Mineral Detector


Line Tracing Aids

 * SLR9A/AUT9 - Silent Line Tracer

 * 2052WL - Wire and Device Locator


Video Camera Detection Equipment

 * VCD - Video Countermeasures Device


TSCM Training Options

 * TSCM Training and Education


Recommended Books

 * Technical Surveillance Counter Measures

 * Technical Surveillance

 * Basic Electronics (relative to TSCM)

 * Communications Theory

 * Acoustics and Microphones

 * Spread Spectrum

 * Intelligence

 * Strategy (The Mind of a Spook)

 * TSCM Textbooks

 * Government TSCM Publications


Intelligence Analysts Bookshelf


Counter Terrorism Book Recommendations

The Counter-Terrorism Handbook
Tactics, Procedures, and Techniques, by Frank Bolz.

The Evolution of Special Forces in Counter-Terrorism
The British and American Experiences
(Praeger Studies in Diplomacy and Strategic Thought)

Jane's Counter Terrorism Handbook

Executive Safety And International Terrorism
A Guide for Travellers, by Anthony J. Scotti

Preparing Your Company for Terrorist Attack
by James E. Lukaszewski, Brian R. Hollstein

Bio-Warfare Book Recommendations

Germs
Biological Weapons and America's Secret War

by Judith Miller, et al (Hardcover - September 2001)

Toxic Terror
Assessing Terrorist Use of Chemical and
Biological Weapons (Bcsia Studies in International Security)
by Jonathan B. Tucker (Editor)

Living Terrors
What America Needs to Know to Survive the
Coming Bioterrorist Catastrophe
by Michael T. Osterholm, John Schwartz

Afghanistan Book Recommendations

The Hidden War
A Russian Journalist's Account of the Soviet War in Afghanistan
by Artyom Borovik

Afghanistan's Endless War
State Failure, Regional Politics, and the Rise of the Taliban
by Larry P. Goodson

Unholy Wars
Afghanistan, America and International Terrorism
by John K. Cooley

Afghanistan
A New History
by Martin Ewans

Land of the Taliban
Russian-Soviet Unconventional Wars and Warfare
in the Caucasus, Central Asia, and Afghanistan
by Robert Bauman

Taliban Book Recommendations

Taliban
Ascent to Power
by M. J. Gohari

Taliban
Militant Islam, Oil and Fundamentalism in Central Asia
by Ahmed Rashid

The Taliban
War, Religion and the New Order in Afghanistan
by Peter Marsden

Fundamentalism Reborn?
Afghanistan and the Taliban
by William Maley

Afghanistan's Endless War
State Failure, Regional Politics, and the Rise of the Taliban
by Larry P. Goodson

Fundamentalism Reborn?
Afghanistan and the Taliban
by William Maley

Reaping the Whirlwind
The Taliban Movement in Afghanistan
by Michael Griffin

Taliban Phenomenon
Afghanistan 1994-1997
by Kamal Matinuddin

Afghanistan's Endless War
State Failure, Regional Politics, and the Rise of the Taliban
by Larry P. Goodson

bin Laden Book Recommendations

bin Laden
The Man Who Declared War on America
by Yossef Bodansky

Osama bin Laden
A War Against the West
by Elaine Landau

Usama Bin Laden's Al-Qaida
Profile of a Terrorist Network
by Yonah Alexander, Michael S. Swetnam

The New Jackals
Ramzi Yousef, Osama bin Laden and the Future of Terrorism
by Simon Reeve

Terrorism and Assymetrical Warfare Book Recommendations

Origins of Terrorism
Psychologies, Ideologies, Theologies, States of Mind
by Walter Reich (Editor), Walter Laqueur

Islam and Islamic Extremism Book Recommendations

Islam: A Short History
by Karen Armstrong

Muhammed - The Prophet
by The Sirdar Ikbal Ali Shah

Muhammad
Man of God
by Seyyed Hossein Nasr

Muhammad's Companions
Essays on Those Who Bore Witness
by Laleh Bakhtiar

A Peace to End All Peace
The Fall of the Ottoman Empire and the Creation of the Modern Middle East
by David Fromkin

God Has Ninety-Nine Names
Reporting from a Militant Middle East
by Judith Miller

Muhammad and the Course of Islam
by H. M. Balyuzi

Madinan Society at the Time of the Prophet
Its Characteristics and Organization
by Akram Diya Al Umari

Middle East Book Recommendations

The Middle East
A Brief History of the Last 2,000 Years
by Bernard Lewis

The Modern Middle East
A Reader
by Philip S. Khoury (Editor), et al

Sandcastles
The Arabs in Search of the Modern World
by Milton Viorst

Peoples and Cultures of the Middle East
by Daniel G. Bates, Amal Rassam

A History of the Arab Peoples
by Albert Hourani

Hammond Atlas of the Middle East
by Hammond Incorporated

Iraq Book Recommendations

ENDGAME
Solving the Iraq Problem -- Once and For All
by Scott Ritter, et al

Out of the Ashes
The Resurrection of Saddam Hussein
by Andrew Cockburn, Patrick Cockburn

The Greatest Threat

Iraq, Weapons of Mass Destruction
and the Growing Crisis in Global Security by Richard Butler

Saddam's Secrets
The Hunt for Iraq's Hidden Weapons
by Tim Trevan

Saudi Arabia Book Recommendations

The History of Saudi Arabia
by Alexei Vassiliev

Mysteries of the Desert
A View of Saudi Arabia
by Isabel Cutler

Doing Business With Saudi Arabia
(Kogan Page Doing Business In... Series) by Anthony Shoult

The Rise, Corruption and Coming Fall
of the House of Saud
by Said K. Aburish

Oil, God and Gold
The Story of Aramco and the Saudi Kings
by Anthony Cave Brown

The Saudi File
People, Power, Politics
by Anders Jerichow (Hardcover - August 1998)

Saudi Arabia and the Politics of Dissent
by Mamoun Fandy (Hardcover - June 1999)

Living & Working in Saudi Arabia
Your Guide to a Successful Short or Long-Term Stay
by Rosalie Rayburn, Kathleen Bush

Saudi Arabia and the United States
Birth of a Security Partnership
(The Adst-Dacor Diplomats and Diplomacy Series)
by Parker T. Hart

Live & Work in Saudi and the Gulf
by Louise Whetter, Victoria Pybus

Mecca
by F. E. Peters

The Kingdom of Saudi Arabia
by David E. Long

Saudi-Yemeni Relations
Domestic Structures and Foreign Influences
by F. Gregory Gause

The Merchants
The Big Business Families of
Saudi Arabia and the Gulf States
by Michael Field

History of the Wahabis
(Founders of Saudi Arabia)
by Louis Alexander Olivier De Corancez, Eric Tabet (Translator)

Holier than Thou
Saudi Arabia's Islamist Radicals
(Washington Institute for Near East Policy, Policy Paper No.52)
by Joshua Teitelbaum

World Trade Center Book Recommendations

Twin Towers
The Life of New York City's World Trade Center
by Angus Kress Gillespie

Divided We Stand
A Biography of New York City's World Trade Center
by Eric Darton

| Books | CDs | Videos | DVDs | Photo Gear | Wireless | Electronics | Software | Tools & Hardware |


Sponsored Mailing Lists:

TSCM-L Technical Security Mailing List - Dedicated to TSCM specialists engaging in expert technical and analytical research for the detection, nullification, and isolation of eavesdropping devices, technical surveillance penetrations, technical surveillance hazards, and physical security weaknesses. Special emphasis is given to detecting and countering espionage and other threats and activities directed by foreign intelligence services against the United States Government, United States corporations, establishments, and citizens. This mailing list is sponsored by James M. Atkinson and Granite Island Group as a public service to the TSCM community.


Click here to subscribe to the [TSCM-L] Mailing List


Everything you've learned in school as "obvious" becomes
less and less obvious as you begin to study the universe.

For example, there are no solids in the universe.

There's not even a suggestion of a solid.

There are no absolute continuums.

There are no surfaces.

There are no straight lines.

-- R. Buckminster Fuller


Audiotel VLF



| Home | What is TSCM | Types of Bugs | Warning Signs You're Bugged |
| How To Behave if Bugged | TSCM Threat Levels | How To Engage a TSCM Firm |
| Qualifications | TSCM Protocol | Bug Frequencies | Phone Taps and Bugging |
| Signal Analysis | TDR Analysis | TDR Tutorial | Wiretapping | Training | Tools |
| Equipment | OSC-5000 | Kaiser | Riser Bond | Avcom | Search Rcvrs |
| Outside Links | Recommended TSCM Books | TSCM Reference Library |
| Recommended U.S. TSCM Firms | TSCM-L Mailing List |


O divine art of subtlety and secrecy!
Through you we learn to be invisible, through you inaudible;
and hence hold the enemy's fate in our hands.

-- Sun Tzu, The Art of War, c. 500bc

Advanced TSCM Signals Detection and Analysis
TSCM - Sweeping the Spectrum for Eavesdropping Devices

Any comments or questions regarding this specific page?

Please feel free to sign our Guest Book

Name
Company
Title
E-mail
Address
Web Page
URL
How did you hear about this page
Comments

    To be contacted for a confidential consultation
    please E-mail: jmatk@tscm.com

    or call: (978) 546-3803 / Fax: (978) 546-9467

    Granite Island Group
    127 Eastern Avenue #291
    Gloucester, MA 01930

    URL: http://www.tscm.com/

Copyright ©2000, James M. Atkinson
Advanced TSCM Signals Detection and Analysis
TSCM - Sweeping the Spectrum for Eavesdropping Devices
Sed quis custodiet ipsos Custodes?

As smoke is driven away, so are they driven;
as wax melts before the fire, so the wicked perish.