Granite Island Group

| Residential | Small Office | Executive Office | Conference Room | Medical Office | Legal Office | Multiple Offices | Other |
| Bug Detection Equipment | OSC-5000 | NJE-4000 | CPM-700 | CMA-100 | Related TSCM Gear | Encryption | Sweep Gear |
| Bug Sweep Services | Wiretap Detection | Tracking Device Detection | Physical Inspection | Computers | Phone Inspection | Engineering |
| Radio Frequency Analysis | Line Tracing | Reflectometry | Telephones | Network Analysis | Physical | Quality Reports |
| Defense | Intelligence | Political Leadership | Medical | Legal | Financial | Entertainment | Other |
| Company Mission Statement | History | Why We Are the Best | About Granite Island Group | Our President |

Granite Island Group

| Residential | Small Office | Executive Office | Conference Room | Medical Office | Legal Office | Multiple Offices | Other |
| Bug Detection Equipment | OSC-5000 | NJE-4000 | CPM-700 | CMA-100 | Related TSCM Gear | Encryption | Sweep Gear |
| Bug Sweep Services | Wiretap Detection | Tracking Device Detection | Physical Inspection | Computers | Phone Inspection | Engineering |
| Radio Frequency Analysis | Line Tracing | Reflectometry | Telephones | Network Analysis | Physical Quality Reports |
| Defense | Intelligence | Political Leadership | Medical | Legal | Financial | Entertainment | Other |
| Company Mission Statement | History | Why We Are the Best | About Granite Island Group | Our President |

  1. Who would want to spy on us?
  2. What information would they be interested in?
  3. Where are we most vulnerable?
  4. Where would they attack us?
  5. When are we most vulnerable?
  6. How could they attack us?
  7. Effects of our corporate secrets being released?
  8. Are we as secure as we think?

It's a waste of money to have any TSCM services performed without first having a careful vulnerability analysis or threat assessment completed.

TSCM Inspection - An evaluation (which does not involve test equipment) of a sensitive facility to determine physical security measures required to protect against technical penetration or unaided audio leakage.

In Place Monitoring (IPM)- This is the simplest and lowest level type of legitimate TSCM sweep, it consists of monitoring a given thing or place while an event or meeting is in progress. While it is just a cursory check it is does allow a certain amount of security and privacy when time is limited. In Place Monitoring assumes that the facilities are secure and that the only threat is from meeting attendees (ie: tape recorders, wireless microphones, etc...)

The amount of formal training needed to do this type of a sweep is minimal (5-10 days) and the equipment required will fit into two or three briefcases.

8566B HP 7000 Series

Full TSCM Survey/Sweep - A comprehensive electronic, visual, and physical examination of a sensitive facility by TSCM personnel (using laboratory grade instruments) to ascertain that the area is free of technical penetrations and to detect technical security hazards and weaknesses.

This type of inspection is commonly done for attorneys, executives, and corporate board rooms. For this inspection every wire in a given area is checked in for any type of covert listening or video devices. Special equipment is used to search for covert devices transmitting on the airwaves. Normally the RF search is done first, followed by the wire and conductor check, followed by a detailed physical search.

The amount of formal TSCM training needed to do this type of a sweep is extensive (500 hours minimum), plus an expert level of knowledge in security, electronics, communications, and computer science is also required (involving thousands of hours of additional baseline formal training).

This type of inspection is commonly performed at military facilities, embassies, defense contractors, DOE facilities, government agencies, police departments, etc...

In Place Monitoring + TSCM Survey - This is one of the most common types of inspections. It involves completing a full sweep prior to the event, and then conducting a normal IPM during the event. Commonly performed for SCIFs, high level business meetings, Board of Directors meetings, and similar high security events.

Protective Detail TSCM Survey/Sweep - Performed strictly for high threat situations (heads-of-state, diplomats, VIPs, entertainers, corporate executives, and the very rich). This is the type of inspection the U.S. Secret Service performs for the President when he is going to be visiting a place. In addition to a full inspection it also involves inspecting and X-raying walls, lamps, furniture, cushions, and so forth.

Additionally, this type of inspection also looks for explosives, bombs, poisons, chemical weapons, contraband, and other safety and security hazards. The goal is to locate not only bugging devices, but anything that could cause the protectee any harm or embarrassment.

The amount of formal training needed to do this type of a sweep is very high, often involving years of training, an extremely high level of expertise is required. Personnel providing this type of service will also be trained in some kind of executive and dignitary protection.

A Protective Detail TSCM Inspection requires specific equipment.

TSCM Preconstruction Assistance - A service conducted by TSCM personnel during the planning stages of new construction.

TSCM Screening - This inspection involves the examination of equipment and furnishings prior to their introduction into a facility which has previously received a TSCM survey.

Rain Dance - This type of TSCM inspection is usually done by inadequately trained individuals with little or no formal training in electronics or intelligence. The tools used are minimal (basically nothing more then fancy props), and the inspection consists of the "sweeper" dancing around with a small hand held box. It is common for this sweeper to find bugs (some, ones he brought with him to insure future business). The amount of formal training needed to do this type of activity is minimal (2-7 days).


Xandi Bug

When contacting any TSCM firm please remember not to call from any
suspect area, do not use your cellular telephone, do not use your
cordless phone, and do not use any suspect telephone (instead call
from a sterile phone somewhere outside the suspect area.


The Objectives of any TSCM Program or Service

Detection - Measures taken to detect technical surveillance devices, technical security hazards, and physical security weaknesses that would permit the technical or physical penetration of a facility.

A technical surveillance device is a item designed to intercept conversations or electronic transmissions and are commonly known as "bugs."

A technical security hazard may allow the unintentional transmission of information, and is any condition which could permit the technical surveillance of an area. This condition may occur with equipment due to its normal design, installation, operation, maintenance, component deterioration, or damaged condition.

For example, some telephones have the ability to pass audio even when hung up.

Nullification - The process of neutralizing or negating technical devices employed by making the placement of such devices more difficult. This includes ensuring that a room is protected with adequate physical construction and security measures thus making the placement or use of illegal listening devices ineffective.

Isolation - A method to deter, or make extremely difficult, the introduction of a eavesdropping device by establishing special areas, security areas, or SCIF's for the conduct of classified or sensitive activities.


According to statistics published by U.S. Attorney Mary Jo White (New York, NY); In March 1997, three New York businessmen (one a former DEA agent) were found guilty of using various store front "Spy Shop" operations to sell over 4,400 illegal listening devices which they had illegally smuggled into the country. As a result of this case over 80 other people were convicted of dealing in illicit eavesdropping equipment... most of those convicted are still in business, and only viewed their criminal case as "a cost of doing business".

The illegal equipment confiscated during the raids included bugging devices that were miniature transmitters hidden in everyday household and office items like pens, calculators, credit cards, and three-plug electric outlet adapters.

Spy Shop Bug Spy Shop Bug
Above Photographs Courtesy of U.S. Justice Department


Uneasy lies the head that wears the crown.
-- William Shakespeare, Henry VI


The First, The Largest, The Most Popular, and The Most Complete TSCM,
Bug Sweep, Spy Hunting, and Counterintelligence Site on the Internet.
small logo About Us | Contact Us | �2010, Granite Island Group, All Rights Reserved